• Title/Summary/Keyword: 개인정보 처리

Search Result 2,373, Processing Time 0.026 seconds

Development of a Mobile GIS Using a Shareware DBMS (Shareware DBMS를 이용한 모바일 GIS의 개발)

  • Yun, Jae-Kwan;Lee, Keun-Ho;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.2 no.2 s.4
    • /
    • pp.25-37
    • /
    • 2000
  • As computer systems of high capacity and high performance recently emerged, various researches about GISs(Geographic Information Systems) have been in progress and many GIS applications have also been developed. From the domestic situation where many people are using mobile devices, because of the recent advances in the mobile technology, we can infer that the time will come when every individual will carry a mobile device with a GPS(Global Positioning System) module resulting from the development of a miniature GPS Module. Therefore, a mobile GIS that can allows users to deal with dynamic GIS data management and perform their tasks while moving will be required. This paper discusses the design and implementation of a mobile GIS using the shareware DBMS, called postgresSQL. The Mobile GIS in which a mobile concept is utilized at the GIS data server makes it possible to insert, delete, update GIS data, to zoom in and zoom out displayed maps, and to locate the user's position on the client device. Therefore, It is possible to manage dynamic GIS data in order to deal with GIS data on the maps while moving, connect various GIS data servers through the middleware, and connected with ITS (Intelligent Transport System) which is one of applications of the Mobile GIS developed in this paper.

  • PDF

A Node2Vec-Based Gene Expression Image Representation Method for Effectively Predicting Cancer Prognosis (암 예후를 효과적으로 예측하기 위한 Node2Vec 기반의 유전자 발현량 이미지 표현기법)

  • Choi, Jonghwan;Park, Sanghyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.10
    • /
    • pp.397-402
    • /
    • 2019
  • Accurately predicting cancer prognosis to provide appropriate treatment strategies for patients is one of the critical challenges in bioinformatics. Many researches have suggested machine learning models to predict patients' outcomes based on their gene expression data. Gene expression data is high-dimensional numerical data containing about 17,000 genes, so traditional researches used feature selection or dimensionality reduction approaches to elevate the performance of prognostic prediction models. These approaches, however, have an issue of making it difficult for the predictive models to grasp any biological interaction between the selected genes because feature selection and model training stages are performed independently. In this paper, we propose a novel two-dimensional image formatting approach for gene expression data to achieve feature selection and prognostic prediction effectively. Node2Vec is exploited to integrate biological interaction network and gene expression data and a convolutional neural network learns the integrated two-dimensional gene expression image data and predicts cancer prognosis. We evaluated our proposed model through double cross-validation and confirmed superior prognostic prediction accuracy to traditional machine learning models based on raw gene expression data. As our proposed approach is able to improve prediction models without loss of information caused by feature selection steps, we expect this will contribute to development of personalized medicine.

ECG Compression and Transmission based on Template Matching (템플릿 매칭 기반의 심전도 압축 전송)

  • Lee, Sang-jin;Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.31-38
    • /
    • 2022
  • An electrocardiogram(ECG) is a recoding of electrical signals of the heart's cyclic activity and an important body information for diagnosing myocardial rhythm. Large amount of information are generated continuously and a significant period of cumulative signal is required for the purpose of diagnosing a specific disease. Therefore, research on compression including clinically acceptable lossy technique has been developed to reduce the amount of information significantly. Recently, wearable smart heart monitoring devices that can transmit electrocardiogram(ECG) are being developed. The use of electrocardiogram, an important personal information for healthcare service, is rapidly increasing. However, devices generally have limited capability and power consumption for user convenience, and it is often difficult to apply the existing compression method directly. It is essential to develop techniques that can process and transmit a large volume of signals in limited resources. A method for compressing and transmitting the ECG signals efficiently by using the cumulative average (template) of the unit waveform is proposed in the paper. The ECG is coded lovelessly using template matching. It is analyzed that the proposed method is superior to the existing compression methods at high compression ratio, and its complexity is not relatively high. And it is also possible to apply compression methods to template matching values.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

A Study on Rhetorical Expression of Public Information Design -Focus on Information Design Case for Seoul Public Transportation- (공공정보디자인의 수사학적 표현에 관한 연구 - 서울시 대중교통 정보디자인 사례를 중심으로 -)

  • Yang, Seung-Ju
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.95-104
    • /
    • 2005
  • Although the volume and complexity of available information have increased, our ability to process such volume of complex information has not been met with corresponding development. Information designers have been given the responsibility to address such unbalanced progress by developing effective visual systems to deliver and communicate such information to the masses in a manner that is quick and easy to process and understand. This study originated in recognition of these issues. This study seeks to find a solution to these issues in rhetorics in order to proliferate visual communications in recognition of the increasing importance of information and visual communication. Rhetorics, a field of study with a long history of analyzing the delivery of communication, provides numerous possibilities for the re-establishment of importance placed on visual information communication. Included in this study are (i) a thorough analysis of the principals of expression and logic offered by rhetorics, as applicable to information design (ii) a proposal to the solution to the above-mentioned issues encompassing the rhetoric process and methods of expression of information design and (iii) the practical application of these design principals to social activities. In order to provide an example of the practical use of the rhetoric methodology Presented in this study, we applied the rhetoric methodology to the 'Information Design for Public Transportation of Seoul.' and developed a new map and a guidebook. The raw data necessary for the foregoing were obtained through the analysis of the information designs that are currently in use in connection with mass transportation in Seoul and the survey evaluation conducted among Seoul residents. We modulated the infrastructure of Seoul by using 48 TAZs, computed the routes that are most likely to be used, and proposed the predictable information analysis process. The design proposed on this study encompasses color coding and use of combined information, and application of style and sequential information analysis process.

  • PDF

Design and Implementation of Order Settlement System Using Artificial Intelligence Speaker (인공지능 스피커를 활용한 주문결제 시스템의 설계 및 구현)

  • Kim, Dong-Hyun;Choi, Byung-Hyun;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1181-1186
    • /
    • 2019
  • Recently, we have been able to quickly order and pay with kiosks even at fast food restaurants, small private restaurants and cafes. However, people with disabilities who are uncomfortable with their arms and who are sitting in wheelchairs are difficult to use by pressing graphical buttons to use kiosks. Older people also feel uncomfortable to use kiosks because of their cognitive abilities to accept new information as they get older. In this paper, to solve this problem, we design and implement a order-payment system to add the voice command element of the AI speaker to the visual command element when the user interacts with the kiosk.

Application of Knowledge Management System for Small and Medium Businesses (중소기업의 지식경영 관리시스템 활용 방안에 관한 연구)

  • Ahn, Kwan-Young;Park, Roh-Gook;Chang, Kyung-Saeng
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.4
    • /
    • pp.111-118
    • /
    • 2013
  • The purpose of this study is to review the relationships among the determinants of knowledge management and knowledge management, and it's consequences, and the moderating effects of organizational culture on the relationship between the determinants of Knowledge Management and Knowledge Management, and the relationship between Knowledge Management and it's consequences. In the relationship between Knowledge Management and it's consequences, knowledge acquisition and knowledge transfer are positively related with personal and intra-organizational, and inter-organizational effectiveness.

  • PDF

WWW based on Missing-Child Prevention System Construction using Fingerprint (WWW 기반 지문을 이용한 미아방지시스템 구축)

  • 송영옥;김성영;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.64-72
    • /
    • 2002
  • In this paper, the aims are to develop convenient and safe system-solutions, looking for missing-child, which is one of the increasing social problems, on the basis of World Wide Web. Finger-print cognition has been researching from long time before, as well as Bio-cognition technology, which is adapted for private-cognition in the field of human-cognition. By the fingerprint cognition, which discern finger print, which is generally used in Bio-cognition and is characterized each by using image-processing, missing-child protection system on the basis of Word Wide Web is designed and implemented in this paper. Additionally, indicates plans for revitalization method of this system.

  • PDF