• Title/Summary/Keyword: outflow of information

Search Result 142, Processing Time 0.03 seconds

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

An Experimental Study on the Analysis of the Interventricular Pressure Waveform in the Moving-Actuator type Total Artificial Heart (이동작동기식 완전 이식형 인공 심장의 심실간 공간 압력 파형 해석에 관한 실험적 연구)

  • 조영호;최원우
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.1
    • /
    • pp.25-36
    • /
    • 1997
  • To regulate cardiac output of the Total Artificial Heart(TAH) physiologically, the hemodynamic information must be toed back to the controller. So far, our group has developed an automatic cardiac output control algorithm using the motor current waveform, It is, however difficult to detect the preload level such as a filling status of ventricular inflow and the variation of atrial pressures within normal physiologic range(0-15 mmHg) by analyzing the motor current which simultaneously reflects the afterload effect. On the other hin4 the interventricular volume pressure(IVP) which is not influenced by arterload but by preload is a good information source for the estimation of preload states. In order to find the relationship between preload and IVP waveform, we set up the artificial heart system on the Donovan type mock circulatory system and measured the IVP waveform, right and left atrial pressures, inflow and outflow waveforms and the signals represented the information of moving actuator's position. We shows the feasibility of estimating the hemodynamic changes of inflow by using IVP waveform. fife found that the negative peak value of IVP waveform is linearly related to atrial pressures. And we also found that we could use the time to reach the negative peak in IVP waveform, the time to open outflow valve, the area enclosed IVP waveform as unfu parameters to estimate blood filling volume of diastole ventricle. The suggested method has advantages of avoiding thrombogenesis, bacterial niche formation and increasing longterm reliability of sensor by avoiding direct contact to blood.

  • PDF

What are the benefits and challenges of multi-purpose dam operation modeling via deep learning : A case study of Seomjin River

  • Eun Mi Lee;Jong Hun Kam
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.246-246
    • /
    • 2023
  • Multi-purpose dams are operated accounting for both physical and socioeconomic factors. This study aims to evaluate the utility of a deep learning algorithm-based model for three multi-purpose dam operation (Seomjin River dam, Juam dam, and Juam Control dam) in Seomjin River. In this study, the Gated Recurrent Unit (GRU) algorithm is applied to predict hourly water level of the dam reservoirs over 2002-2021. The hyper-parameters are optimized by the Bayesian optimization algorithm to enhance the prediction skill of the GRU model. The GRU models are set by the following cases: single dam input - single dam output (S-S), multi-dam input - single dam output (M-S), and multi-dam input - multi-dam output (M-M). Results show that the S-S cases with the local dam information have the highest accuracy above 0.8 of NSE. Results from the M-S and M-M model cases confirm that upstream dam information can bring important information for downstream dam operation prediction. The S-S models are simulated with altered outflows (-40% to +40%) to generate the simulated water level of the dam reservoir as alternative dam operational scenarios. The alternative S-S model simulations show physically inconsistent results, indicating that our deep learning algorithm-based model is not explainable for multi-purpose dam operation patterns. To better understand this limitation, we further analyze the relationship between observed water level and outflow of each dam. Results show that complexity in outflow-water level relationship causes the limited predictability of the GRU algorithm-based model. This study highlights the importance of socioeconomic factors from hidden multi-purpose dam operation processes on not only physical processes-based modeling but also aritificial intelligence modeling.

  • PDF

Calculation of Runoff in Flood Basin Using GIS (GIS를 활용한 홍수유역의 유출량 산정)

  • 이형석;김인호
    • Spatial Information Research
    • /
    • v.11 no.2
    • /
    • pp.143-153
    • /
    • 2003
  • In order to investigate the effect of a pouring rain that it follows in the typhoon, the effect analysis with actual measurement data of rainfall outflow it follows in flood basin is necessary. Also there is a case that it analyzes with the fact that the rainfall occurs identically in whole basin in case of the rainfall outflow analysis, but the actual rainfall distribution from the basin very will be irregular and the interpretation which it reflects must become accomplished. It created spatial information of terrain, land use and the soil using GIS. It created topographical factor of the subject area and calculated CN(runoff curve number) with WMS(Watershed Modeling System). It calculated runoff using a HEC-1 model and the Rational Method connected at the WMS. By connecting GIS and WMS, it calculated the effect of a pouring rain and runoff from the construction area. Also it will be able to apply with a basic data in more efficient runoff analysis.

  • PDF

A Blockchain Application for Personal health information: Focusing on Private Block Scheme (개인 의료정보 보호를 위한 블록체인 적용 방안: 프라이빗 블록 스킴을 중심으로)

  • Kwon, HyukJun;Kim, Hyeob;Choi, Jaewon
    • Knowledge Management Research
    • /
    • v.19 no.4
    • /
    • pp.119-131
    • /
    • 2018
  • In this paper, I research the issue of information security for medical information system of each parties. The outflow of the Personal medical information can lead to problems of medical systems and disadvantage to an individual. In this paper, we research the information security based on a blockchain. In addition, I have analyzed blockchain. I suggest a medical information system framework that can help to keep the privacy of patients by using a blockchain network. Also, In this paper try to explain using private blockchain for medical system. Blockchain can keep the integrity and transparency of the medical records. This research, shows how can build the private blockchain for medical records and how to get the integrity of Data from Private Blockchain and Distuributed Ledger Technology.

Waikoropupu Springs

  • Cody, Ashley
    • Journal of the speleological society of Korea
    • /
    • no.7
    • /
    • pp.25-28
    • /
    • 1998
  • This article is a brief study of some properties of Pupu Springs together with comparative comments on nearby rivers and resurgences. The information presented was collected by several people over the period from January 1970 until November 1971, and all analyses were made within a laboratory. “Waikoropupu” is a Maori name meaning “where water bubbles up through a throat.” However the name is more commonly simply 'Pupu Springs. Location is about 7km from Takaka; the outflow from the Springs flowing into the Takaka River at a point within 2km of the town. Grid reference for the Springs is: N.Z.M.S. I, Takaka, S8 (1968) 170819.(omitted)

  • PDF

A Study on the Intrusion Detection Method using Firewall Log (방화벽 로그를 이용한 침입탐지기법 연구)

  • Yoon, Sung-Jong;Kim, Jeong-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF

Preferences for Supercomputer Resources Using the Logit Model

  • Hyungwook Shim;Jaegyoon Hahm
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.261-267
    • /
    • 2023
  • Public research, which requires large computational resources, utilizes the supercomputers of the National Supercomputing Center in the Republic of Korea. The average utilization rate of resources over the past three years reached 80%. Therefore, to ensure the operational stability of this national infrastructure, specialized centers have been established to distribute the computational demand concentrated in the national centers. It is necessary to predict the computational demand accurately to build an appropriate resource scale. Therefore, it is important to estimate the inflow and outflow of computational demand between the national and specialized centers to size the resources required to construct specialized centers. We conducted a logit model analysis using the probabilistic utility theory to derive the preferences of individual users for future supercomputer resources. This analysis shows that the computational demand share of specialized centers is 59.5%, which exceeds the resource utilization plan of existing specialized centers.

Development of a Web Security System Using Cryptographic Token (보안토큰을 이용한 웹 보안 시스템 개발)

  • Ha, Gyeong-Ju;Yun, Jae-U;Gang, Chang-Gu;Jang, Seung-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.654-663
    • /
    • 1999
  • In this paper, we develop a security system which enhances the security of information during transmission over the World Wide Web for solving problems related to outflow of the information on the internet. Our system provides safe security functions without modifying the existing Web server and browser by utilizing CGI, Plug-in, and Socket Spy techniques. Our system implements user access control and data encryption/decryption by using the hardware cryptographic token instead of using a software technique as in previous systems, and hence is a more robust security system.

  • PDF

Analysis of Change Transitions in Regional Types in Emergency Department Patient Flows of in Jeonlado (2014-2018) (전라지역 응급실 환자의 유출입 분석 및 지역유형 변화 추이)

  • Lee, Jae-Hyeon;Lee, Sung-Min;Kim, Seongjung;Oh, Mi-Ra
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.126-131
    • /
    • 2020
  • This study analyzed the inflow and outflow patterns of emergency department patients, to identify changes in regional types in cities, counties, and districts in Jeonlado, Korea. Data of areas in Jeonlado for 2014 to 2018 were extracted from the National Emergency Department Information System. The extracted data includes the patients' and emergency medical institution addresses, which were used to calculate the relevance index (RI) and commitment index (CI). The calculated indices were classified into regional types by applying cluster analysis. A non-parametric method, Kruskal-Wallis test, was employed to examine the differences between years for RI and CI by regional types. The results of cluster analysis using the relevance and commitment indices revealed three regional types. Regions in cluster 1 were classified as outflow type, in cluster 2 as inflow type, and in cluster 3 as self-sufficient. RI and CI were calculated for each cluster or regional type. There were no significant differences between years in cluster 2 (inflow type) and cluster 3 (self-sufficient type). In cluster 1 (outflow type), there were no significant differences in CI between the years; however, there were significant differences in RI between 2014 and 2017, and 2014 and 2018. It is difficult to see that the emergency medical environment has improved due to the increased concentration of emergency medical care.