• Title/Summary/Keyword: software convergence

Search Result 2,272, Processing Time 0.202 seconds

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.

Quantitative analysis on the technical interoperability between railway systems for the operation of trans-continental railways (대륙철도 운행을 위한 기술적 상호운용성에 대한 계량적 분석)

  • Park, Su-Myung;Park, Eun-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.645-652
    • /
    • 2018
  • Recently, as South Korea has joined the OSJD, the rules of the OSJD need to be applied to South Korea. Therefore, the railways are connected to the continent railway in terms of software, but the railway systems in neighboring countries have been developed and operated for a long time, and are quite different with some restrictions in terms of hardware. Therefore, this study analyzed the current railway systems of neighboring countries' based on the TSI used in Europe for technical interoperability. A real operation with the operation models within the specific route was assumed and vector functions for the Infrastructure vector & Rolling stock vector were produced. The IOP value was calculated by working out the interfacing matrix value between the infrastructure vector and rolling stock vector. As a result of calculating the IOP in a specific route, which is from Busan South Korea to Vladivostok with the diesel locomotive hauling freight cars, the value was only 22%, which is fairly low in terms of the interoperability. In other words, there are 77.8% restricting items preventing their interoperability. Such restricted causes should be improved to increase the technical interoperability in the long term. Moreover, and when railway systems are constructed and manufactured, it is important to keep IOP 100% to increase the operating efficiency in continental railways.

Development of SDN-based Network Platform for Mobility Support (이동성 지원을 위한 SDN 기반의 네트워크 플랫폼 개발)

  • Lee, Wan-Jik;Lee, Ho-Young;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.401-407
    • /
    • 2019
  • SDN(Softeware Defined Networking) has emerged to address the rapidly growing demand for cloud computing and to support network virtualization services. Therefor many companies and organizations have taken SDN as a next-generation network technology. However, unlike the wired network where the SDN is originally designed, the SDN in the wireless network has a restriction that it can not provide the mobility of the node. In this paper, we extended existing openflow protocol of SDN and developed SDN-based network platform, which enables the SDN controller to manage the radio resources of its network and support the mobility of the nodes. The mobility support function of this paper has the advantage that a node in the network can move using its two or more wireless interfaces by using the radio resource management function of the SDN controller. In order to test the functions implemented in this paper, we measured parameters related to various transmission performance according to various mobile experiments, and compared parameters related to performance using one wireless interface and two interfaces. The SDN-based network platform proposed in this paper is expected to be able to monitor the resources of wireless networks and support the mobility of nodes in the SDN environment.

Risk Factors Identification and Priority Analysis of Bigdata Project (빅데이터 프로젝트의 위험요인 식별과 우선순위 분석)

  • Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.25-40
    • /
    • 2019
  • Many companies are executing big data analysis and utilization projects to legitimize the development of new business areas or conversion of management or technical strategies. In Korea and abroad, however, such projects are failing because they are not completed within specified deadlines, which is not unrelated to the current situation in which the knowledge base for big data project risk management from an engineering perspective is grossly lacking. As such, the current study analyzes the risk factors of big data implementation and utilization projects, in addition to finding risk factors that are highly important. To achieve this end, the study extracts project risk factors via literature review, after which they are grouped using affinity methodology and sifted through expert surveys. The deduced risk factors are structuralize using factor analysis to develop a table that categorizes various types of big data project risk factors. The current study is significant that in it provides a basis for developing basic control indicators related to risk identification, risk assessment, and risk analysis. The findings from the study contribute greatly to the success of big data projects, by providing theoretical basis regarding efficient big data project risk management.

The Influence of Open Innovation on Innovation Performance of SMEs : Estimation using the Three-step Least Squares method (개방형 혁신이 중소기업의 혁신성과에 미치는 영향 : 3단계 최소자승법을 이용한 추정)

  • Jeong, Myoung-Sun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.145-152
    • /
    • 2021
  • In this study, we have examined the effect of open innovation of SMEs on innovation performance of firms. Most studies do not consider internal generation in relation to open innovation and innovation performance.We conducted empirical studies to overcome this problem. The research was carried out by collecting data collected from 512 SMEs and the 3SLS method was used to minimize the internal generation. As a result, open innovation investment and use of external ideas among SMEs' open innovation have positively influenced project success and technical performance. But, the introduction of technology and cooperation with the research organization did not affect the innovation performance, which is presumed to be due to the fact that the open innovation of SMEs is limited to relatively inexpensive activities. Therefore, in order to promote open innovation of SMEs, it is necessary to provide support for relatively high-cost activities and to improve the innovation performance of enterprises. In order to reduce the difficulties of open innovation activities, domestic universities and research institutes should support the construction of enterprise networks and actively support the utilization of technology to expand innovation performance.

Review of Non-invasive Interventions for Drooling Problems in Children With Cerebral Palsy: Trends and Analysis of Interventions for Drooling (신경발달장애 아동의 침흘림치료를 위한 비침습적 중재방법에 관한 고찰: 경향 및 중재방법 분석)

  • Jeon, Joo young;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.2
    • /
    • pp.37-51
    • /
    • 2021
  • Objective : The purpose of this study was to analyze non-invasive treatments and drooling assessment methods in children with cerebral palsy and developmental disabilities, who drool. Methods : This study searched two hundred papers published in 2005-2019. Forty-four papers were selected based on their abstract and title, and ten papers were finally selected following a secondary search. Results : The PEDro Scale of the selected papers was high with an average of seven points. As a result of analyzing the overall trends, the study participants were primarily patients with cerebral palsy, and recently, the therapeutic intervention of oral sensory exercise was more actively studied than behavioral modification. Studies of behavioral modification and oral sensory exercise intervention methods were found to have differences in participant age and, cognitive level, number of participants, research design, treatment time, and duration. Studies to confirming the frequency and severity of the drooling measurement method were found to be the main factor. Conclusion : This study analyzed typical behavioral modification and oral sensory exercise interventions as examples of non-invasive therapeutic interventions for children with cerebral palsy and developmental disabilities and provided information to help select appropriate therapeutic intervention methods when planning non-invasive therapy using behavioral modification and oral sensory exercise therapy.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Analysis of the Impact Relationship for Risk Factors on Big Data Projects Using SNA (SNA를 활용한 빅데이터 프로젝트의 위험요인 영향 관계 분석)

  • Park, Dae-Gwi;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.79-86
    • /
    • 2021
  • In order to increase the probability of success in big data projects, quantified techniques are required to analyze the root cause of risks from complex causes and establish optimal countermeasures. To this end, this study measures risk factors and relationships through SNA analysis and presents a way to respond to risks based on them. In other words, it derives a dependency network matrix by utilizing the results of correlation analysis between risk groups in the big data projects presented in the preliminary study and performs SNA analysis. In order to derive the dependency network matrix, partial correlation is obtained from the correlation between the risk nodes, and activity dependencies are derived by node by calculating the correlation influence and correlation dependency, thereby producing the causal relationship between the risk nodes and the degree of influence between all nodes in correlation. Recognizing the root cause of risks from networks between risk factors derived through SNA between risk factors enables more optimized and efficient risk management. This study is the first to apply SNA analysis techniques in relation to risk management response, and the results of this study are significant in that it not only optimizes the sequence of risk management for major risks in relation to risk management in IT projects but also presents a new risk analysis technique for risk control.

A study on the development of IoT-based middle school SW·AI education contents -Connection with Curriculum- (IoT 기반 중학교 SW·AI 교육 콘텐츠 개발에 관한 연구 -교육과정과의 연계-)

  • Han, JungSoo;Lee, Kenho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.21-26
    • /
    • 2022
  • This study aims to enhance the cultivation of SW·AI basic competencies of middle school students by forming and distributing SW·AI education programs for middle school students who form the basis of their lives. In addition, by planning SW·AI education programs in connection with the regular curriculum, it is intended to serve as a cornerstone for the public education of SW·AI education that will be implemented from 2025. To this end, the concept of SW and AI in middle school was first defined and a plan to link software/artificial intelligence learning factors to the regular curriculum was proposed, and based on this, SW·AI education programs for middle school students were prepared. Based on literature research, the understanding of artificial intelligence technology, the value of data, and the use of artificial intelligence technology in real life were set as SW·AI education contents, and educational programs were organized by linking them with the current middle school curriculum. All SW·AI education was organized in the form of practice rather than theory so that classes could be conducted centered on participants, and the purpose of the course was to cultivate the ability to use artificial intelligence technology in real life based on understanding artificial intelligence technology.

The Definition of Frail Elderly and the Frailty Screening Assessment Tool: A Systematic Review (허약노인의 정의 및 허약 선별 평가도구에 관한 체계적 고찰)

  • Lee, Gyeong A;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.3
    • /
    • pp.43-56
    • /
    • 2021
  • Objective : The objective of this study was to present the components of frailty by organizing the definitions of frail elderly and analyzing the tools used to screen them. Methods : This study searched for articles at involved frailty screening assessments in the elderly. Databases including CINAHL, Embase, Medline Complete, and PubMed were searched. The search terms were "assess" AND "frailty" AND "screening" AND ("frail elderly" OR "elderly"). Results : A total of 539 articles were identified by the search and 11 articles were selected. Frailty occurs due to the depressed function of multidimensional factors, and a frail elderly person is defined as one at high risk of health degeneration, functional impairment, and occurrence of disability, and having a high level of threat to life. Seven tools were selected from 11 articles. The most frequently used tool was the frailty phenotype, which was used in five articles (45.4%). The identified components of frailty were physical, activity participation, nutrition, psychological, social, overall health, and age. Conclusion : The results confirmed the definition and components of frailty. This study is expected to contribute to the future development of standardized evaluation tools for screening frail elderly individuals and intervention programs for the management of the frail elderly.