• Title/Summary/Keyword: web environment

Search Result 2,896, Processing Time 0.028 seconds

An App-based Evolving Medical Nomogram Service System (앱기반 진화 의료 노모그램 서비스 시스템)

  • Lee, Keon-Myung;Hwang, Kyoung-Soon;Kim, Wun-Jae
    • Journal of Korea Entertainment Industry Association
    • /
    • v.4 no.4
    • /
    • pp.72-76
    • /
    • 2010
  • Clinical nomogram is a graphical representation of numeric formula, constructed from clinical cases database of followed patients' treatment, which is used for medical predication. For a clinical nomogram to contribute patient care, it is required to accumulate as many as clinical cases and to extract medical prediction knowledge. It needs to be equipped with an effective method to build medical nomogram with high predication accuracy. It is desirable for medical nomogram to be accessible at patient care point. This paper proposes a medical nomogram service system architecture which takes into account the above-mentioned issues. The proposed system architecture includes a web-based database subsystem to maintain and keep track of clinical cases. On the periodic basis, a new clinical nomogram is reconstructed for the updated clinical database. For the convenient use of patient care practice environment, an app-based program is provided which makes prediction based on the most recent clinical nomogram constructed in the service system. The proposed method has been applied to a clinical nomogram service system development for recurrence and survival prediction in bladder cancer patients.

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

A Proposed Authentication Scenario based on SBT implementation for Decentralized User Authentication

  • Sung-Woo Cho;Jung-Won Seo;Soo-Yong Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.115-127
    • /
    • 2023
  • In this paper, we propose a SBT user authentication method for decentralized environment like blockchain. Due to tranparancy of blockchain, it is difficult to secure the privacy of person information, so it is necessary to use a new authentication method. In order to solve this problem, research using SBT for user authentication is being conducted, however most studies have implemented SBT in form of removing function which is related to trasmission from NFT without applying the technical features requried for SBT. The proposed scheme of this paper is implemented SBT which secured safetey and usabillity with using locking token function of ERC-5192. Also, based of implemented SBT scheme propose a user authentication process. To verify our approach, we set a hypothetical user authentication scenario based on the proposed user authentication process and deployed a smart contract that satisfies the 19 function call scenarios that occur in that scenario.

MATERIAL MATCHING PROCESS FOR ENERGY PERFORMANCE ANALYSIS

  • Jung-Ho Yu;Ka-Ram Kim;Me-Yeon Jeon
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.213-220
    • /
    • 2011
  • In the current construction industry where various stakeholders take part, BIM Data exchange using standard format can provide a more efficient working environment for related staffs during the life-cycle of the building. Currently, the formats used to exchange the data from 3D-CAD application to structure energy analysis at the design stages are IFC, the international standard format provided by IAI, and gbXML, developed by Autodesk. However, because of insufficient data compatibility, the BIM data produced in the 3D-CAD application cannot be directly used in the energy analysis, thus there needs to be additional data entry. The reasons for this are as follows: First, an IFC file cannot contain all the data required for energy simulation. Second, architects sometimes write material names on the drawings that are not matching to those in the standard material library used in energy analysis tools. DOE-2.2 and Energy Plus are the most popular energy analysis engines. And both engines have their own material libraries. However, our investigation revealed that the two libraries are not compatible. First, the types and unit of properties were different. Second, material names used in the library and the codes of the materials were different. Furthermore, there is no material library in Korean language. Thus, by comparing the basic library of DOE-2, the most commonly used energy analysis engine worldwide, and EnergyPlus regarding construction materials; this study will analyze the material data required for energy analysis and propose a way to effectively enter these using semantic web's ontology. This study is meaningful as it enhances the objective credibility of the analysis result when analyzing the energy, and as a conceptual study on the usage of ontology in the construction industry.

  • PDF

Research on Correlating Data Loading with User Experience (데이터 로딩과 사용자 경험의 상관관계 분석에 관한 연구)

  • In-sik Yun;Il-young Moon
    • Journal of Practical Engineering Education
    • /
    • v.16 no.2
    • /
    • pp.185-193
    • /
    • 2024
  • With the advent of smartphones, people can access various information through the internet anytime and anywhere. Even in the vehicle environment, users can use the internet. Users interact with web and applications every day and get information. However, as the amount of data to be processed by the program increases, users inevitably receive a message to wait. User waiting is an inconvenient experience, but minimizing user waiting is the best way because there is time required for data processing. However, if the service processing time exceeds the expected time, users experience more severe boredom and pain. Therefore, various methods and researches are being conducted to alleviate the boredom of user waiting. The most commonly used method to alleviate user waiting boredom is loading. In this study, we investigated the effect of skeleton loading, the latest loading technique, on user waiting experience, and how attractive it is as a design technique in terms of UI compared to other loading techniques.

Association between smartphone overdependence and mental health in South Korean adolescents: a secondary data analysis

  • Hyeseon Yun;Eun Kyoung Choi
    • Child Health Nursing Research
    • /
    • v.30 no.2
    • /
    • pp.87-96
    • /
    • 2024
  • Purpose: The rising prevalence of smartphone overdependence among adolescents and its detrimental impact on mental health have become a growing concern. This study aimed to investigate the association between smartphone overdependence and the mental health of Korean adolescents. Methods: Participants were drawn from the 16th Korea Youth Risk Behavior Web-based Survey conducted in 2020. The dependent variable as smartphone overdependence, while the main exposure of interest was mental health, encompassing generalized anxiety disorder (GAD), perceived stress, sources of perceived stress, perceived loneliness, and perceived depressive symptoms. The study employed the Rao-Scott chi-square test and multiple logistic regression using IBM SPSS version 26.0. Results: The participants comprised 54,948 adolescents aged 13 to 18 years. Among them, 25.1% (n=13,775) were categorized as smartphone overdependence group. Specifically, 20.3% of adolescents who reported GAD ≥10 and 22.5% of those who reported experiencing high levels of perceived loneliness were identified as smartphone overdependent. The GAD increased a risk of smartphone overdependence by 2.61 times (95% confidence interval [95% CI]: 2.46-2.77). Perceived loneliness was associated with 1.98-fold (95% CI: 1.87-2.09) increased risk of smartphone overdependence. Additionally, conflict with peers was found to increase the risk of smartphone overdependence by 4.63-fold (95% CI: 3.89-5.52), followed by conflict with parents (odds ratio [OR]: 4.52, 95% CI: 3.84-5.31), and family environment (OR: 4.52, 95% CI: 3.75-5.46). Conclusion: The findings underscore a significant association between smartphone overdependence and mental health in Korean adolescents. Healthcare services to improve their emotional coping and interpersonal skills are necessary.

Constructing an Internet of things wetland monitoring device and a real-time wetland monitoring system

  • Chaewon Kang;Kyungik Gil
    • Membrane and Water Treatment
    • /
    • v.14 no.4
    • /
    • pp.155-162
    • /
    • 2023
  • Global climate change and urbanization have various demerits, such as water pollution, flood damage, and deterioration of water circulation. Thus, attention is drawn to Nature-based Solution (NbS) that solve environmental problems in ways that imitate nature. Among the NbS, urban wetlands are facilities that perform functions, such as removing pollutants from a city, improving water circulation, and providing ecological habitats, by strengthening original natural wetland pillars. Frequent monitoring and maintenance are essential for urban wetlands to maintain their performance; therefore, there is a need to apply the Internet of Things (IoT) technology to wetland monitoring. Therefore, in this study, we attempted to develop a real-time wetland monitoring device and interface. Temperature, water temperature, humidity, soil humidity, PM1, PM2.5, and PM10 were measured, and the measurements were taken at 10-minute intervals for three days in both indoor and wetland. Sensors suitable for conditions that needed to be measured and an Arduino MEGA 2560 were connected to enable sensing, and communication modules were connected to transmit data to real-time databases. The transmitted data were displayed on a developed web page. The data measured to verify the monitoring device were compared with data from the Korea meteorological administration and the Korea environment corporation, and the output and upward or downward trend were similar. Moreover, findings from a related patent search indicated that there are a minimal number of instances where information and communication technology (ICT) has been applied in wetland contexts. Hence, it is essential to consider further research, development, and implementation of ICT to address this gap. The results of this study could be the basis for time-series data analysis research using automation, machine learning, or deep learning in urban wetland maintenance.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

Implementation of a Wearable Device for Monitoring the Health Status of the Elderly Living Alone

  • Ji-Hoon Lee;Gyung-Hwan Kim;Myeong-Chul Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.39-46
    • /
    • 2024
  • In this paper, we propose a low-cost wearable device that can monitor the health status of the elderly living alone in real-time. As aging is accelerating, the elderly population is rapidly increasing, and the social isolation of the elderly living alone is causing physical and mental difficulties and the number of elderly people dying alone is increasing, becoming a social problem. In this study, we propose a belly band-type wearable device that can monitor the biometric information of elderly living alone. The proposed device transmits electromyogram, electrocardiogram, and body temperature information to a remote server through an Arduino-based sensor built into the abdominal band. Transmitted information can be monitored in a web environment in real-time, and it has the feature of enabling remote monitoring of a large number of subjects with a small amount of management manpower. The research results will contribute to improving the safety and welfare of seniors living alone by not only detecting lonely deaths in advance but also responding immediately to dangerous situations that may occur in daily life.

Worker Location Tracking System of Shipyard using Power Line Communication and Beacon (전력선 통신과 비컨을 활용한 선박 건조 현장의 작업자 위치 추적 시스템)

  • Taewoong Hwnag;Young-Doo Lee;Ki-Woong Park;In-Soo Koo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.41-49
    • /
    • 2024
  • This paper discusses the modeling and implementation of a worker location system at a shipbuilding site. The importance of worker location in an industrial environment is highlighted as a critical element in the prevention of industrial accidents. The paper presents a worker tracking system that integrates power line and beacon communication to accurately track worker position. Through experiments, the paper demonstrates how to monitor the changes in worker location based on different scenarios and how to access the status of worker location using the manager's web service. The paper can be used for the design of a system that will provide real-time location information to safety managers for the improvement of worker safety management.