• Title/Summary/Keyword: 검색장비

Search Result 137, Processing Time 0.023 seconds

Implementation of Mobile Medicine Image Viewer System Based on Embedded (임베디드 기반의 모바일 의료영상 검색시스템 구현)

  • Kim Hyeong-Gyun;Kim Yong-Ho;Lee Sang-Beom;Bae Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.913-916
    • /
    • 2006
  • 의료시스템은 모든 것이 병원 네트워크를 중심으로 의료 서비스가 제공되어 진다. 하지만 자연재해, 천재지변과 같은 갑작스런 환자 발생으로 인한 응급 이동 사항, 혹은 진료자의 외진 및 환자 방문시에는 일반 데스크탑 PC에서 이루어지는 상태의 의료 서비스가 아닌 휴대하기 간편하고 언제 어디서나 의료서비스를 받을 수 있는 Personal Digital Assistant (PDA)와 같은 휴대용 기기에서의 의료시스템이 필요하다. PDA는 휴대가 용이하며 유선 네트워크 시스템에 구애받지 않는 무선 모바일 장비로서 무선 통신이 가능한 곳이라면 언제 어디서라도 환자에 대한 의료 정보를 조회할 수 있다. 또한 PDA의 통신 기술로서 병원과의 실시간 통신이 가능하여 응급 환자에 대해 빠른 진료를 제공 할 수 있다. 이와 더불어 임베디드기기 프로세서의 발달로 인하여 연산처리 기술도 많은 향상을 가져왔고 이로 인하여 기존의 PDA에서의 문제였던 DICOM영상의 조회 및 처리속도에도 많은 향상을 가져왔다. 이에 본 연구에서는 의료영상 표준인 DICOM표준을 따르며 이동성이라는 장점을 통하여 언제 어디서나 손쉽게 진료자가 환자의 의료정보 및 의료 영상을 조회할 수 있도록 하는 PDA용 모바일 의료영상 조회 시스템을 PXA255 기반의 Embedded Linux 상에서 QT/C++을 사용하여 구현하였다.

  • PDF

Virtual Machine for Program Testing on the Virtual Network Processor Environment (가상의 네트워크 프로세서 환경에서 프로그램 테스트를 위한 가상머신)

  • Hong, Soonho;Kwak, Donggyu;Ko, BangWon;Yoo, Chae-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.514-517
    • /
    • 2012
  • 최근 인터넷 사용자 증가와 네트워크를 기반의 응용 프로그램이 다양하게 개발되고 있다. 또한 스마트 폰과 매블릿 PC 의 대중화로 누구나 쉽게 인터넷을 통해 정보검색 서비스를 이용할 수 있다. 따라서 갈수록 증가하는 패킷에 대한 제]어와 이동, 삭제 등과 같은 처리를 빠르게 하기 위해 네트워크 프로세서 (Network Processor)가 개발되었다. 네트워크 프로세서는 패킷 제어와 이동, 삭제를 수행하는데 최적화되어 있다. 하지만 네트워크 프로세서를 개발한 회사마다 교차개발환경 툴과 개발언어가 서로 다르기 때문에 소스코드 재사용 및 확장이 어렵다. 또한 네트워크 프로세서에서 동작하는 프로그램을 매스트 하기 위해 하드웨어 장비가 필요하고 네트워크 프로세서에 종속적인 개발환경과 언어를 배우는 것은 프로그래머에게 큰 부담을 준다. 본 논문에서는 네트워크 프로세서에 최적화된 기능을 언어 레벨에서 정의한 eFlowC 언어를 사용하고 범용 컴퓨터에서 매스트 및 실행을 할 수 있는 가상머신을 제안한다. 그리고 가상머신 중간언어를 사용하여 가상머신이 설치된 범용 컴퓨터에서 소스코드 재사용 및 확장을 가능하게 한다. 따라서 범용 컴퓨터에서 프로그램 테스트를 통해 신뢰성 높은 프로그램을 작성할 수 있다.

Study on the Standardization of Management Form through Integrated Management of CCTV (CCTV 통합관리를 위한 관리대장 표준화 연구)

  • PARK, Jeong-Woo;LEE, Seong-Ho;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2016
  • Closed-circuit television(CCTV) is a facility that forms the backbone of the ubiquitous services provided by the Integrated Management Center of the Ministry of Land, Infrastructure and Transport and the Integrated Control Center of the Ministry of the Interior. However, it is installed and managed according to different laws, as it is operated and managed by each department. Moreover, because there are no regulatory grounds for unified management of CCTV, each municipality responsible for the actual management manages it based on the individual standards of each department. Thus, the purpose of this study is to develop a standardized management form to establish an integrated management plan. The author inspected the existing situation by examining the legal system and public data and through hands-on worker interviews, and discovered the managed element by reviewing the specifications of the bidding system. The management form for integrated management comprises the above requirements along with the management histories and linkage of intelligent facilities. A uniform management form for integrated management containing specifications of the CCTVs installed by various departments is created, and is easily searched for facilities to check requirements for joint use. The result of this study can contribute to building the database of facility management system for integrated management of facilities at the integrated management center as well as for a detailed simulation of the selection of location of CCTV depending on the CCTV's specifications.

Study of water drowning death patients on clinical care and prevention (수중익사 사망 환자의 임상 치료 및 예방에 대한 연구)

  • Kim, Seon-Rye;Cho, Byung-Jun;Ko, Jang-Sik
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.427-432
    • /
    • 2016
  • The purpose of this study was to investigate drowning death patients on clinical care and prevention. Drowning accidents that occurred in the Republic of Korea were identified by using the Emergency Activity Daily Report Data from the National Emergency Management Agency (NEMA). The age of drowning accidents was 20-29 years (25.4%). Drowning cases for the months of August was 17.6%. The main circumstance involved in the drowning cases was swimming (45.0%). Half of swimming incidents related the drowning accidents of people attempting to save a life of a family member or friend from the water. The most common location was at a lake or reservoir (40.2%). Drowning is a main cause of accidents in the Republic of Korea. Preventive strategies that may be beneficial for persons contain life jackets or life rings supply, upgrading swimming ability, placing lifeguards based on public education activities.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Automatic Optimization Methods for Image Processing Programs Using OpenCL (OpenCL을 이용한 이미지 처리 프로그램의 자동 최적화 방법)

  • Shin, Jaeho;Jo, Gangwon;Lee, Ilkoo;Lee, Jaejin
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.188-193
    • /
    • 2017
  • In this paper, we propose automatic OpenCL optimization techniques that offer the best performance for image processing programs on any hardware system. Developers should seek a proper way of parallelization and an appropriate work-group size for the architecture of target compute devices to achieve the best performance. However, testing potential devices to find them is both time-consuming and costly. Our techniques automatically set up hardware-optimized parallelization and find a suitable work-group size for the target device. Furthermore, using OpenCL does not always provide better performance in image processing. Hence, we also propose a way to automatically search for a threshold image size to allow image processing programs to decide whether or not to use OpenCL. Our findings demonstrate that out techniques improve the image processing performance significantly.

Learning Predictive Models of Memory Landmarks based on Attributed Bayesian Networks Using Mobile Context Log (모바일 컨텍스트 로그를 사용한 속성별 베이지안 네트워크 기반의 랜드마크 예측 모델 학습)

  • Lee, Byung-Gil;Lim, Sung-Soo;Cho, Sung-Bae
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.4
    • /
    • pp.535-554
    • /
    • 2009
  • Information collected on mobile devices might be utilized to support user's memory, but it is difficult to effectively retrieve them because of the enormous amount of information. In order to organize information as an episodic approach that mimics human memory for the effective search, it is required to detect important event like landmarks. For providing new services with users, in this paper, we propose the prediction model to find landmarks automatically from various context log information based on attributed Bayesian networks. The data are divided into daily and weekly ones, and are categorized into attributes according to the source, to learn the Bayesian networks for the improvement of landmark prediction. The experiments on the Nokia log data showed that the Bayesian method outperforms SVMs, and the proposed attributed Bayesian networks are superior to the Bayesian networks modelled daily and weekly.

  • PDF

Design and Implementation of Web-Based MINI-PACS using the DICOM (DICOM을 이용한 웹 기반 MINI-PACS 설계 및 구현)

  • 지연상;이성주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.1095-1104
    • /
    • 2000
  • In recent years, medical procedures have become more complex, while financial pressures for shortened hospital stays and increased efficiency in patient care have increased. As a result, several shortcomings of present film-based systems for managing medical images have become apparent. Maintaining film space is labor intensive and consumes valuable space. Because only single copies of radiological examinations exist, they are prone to being lost or misplaced, thereby consuming additional valuable time and expense. In this paper, mini-PACS for image archiving, transmission, and viewing offers a solution to these problems. Proposed mini-PACS consists of mainly four parts such as web module, client-server module, internal module, acquisition module. In addition, mini-PACS system includes DICOM converter that non-DICOM file format converts standard file format. In client-server module case, proposed system is combined both SCU (service class user: client) part and SCP(service class provider: sewer)part therefore this system provides the high resolution image processing techniques based on windows platform. Because general PACS system is too expensive for medium and small hospitals to install and operate the full-PACS. Also, we constructed web module for database connection through the WWW.

  • PDF

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

Classification of Client-side Application-level HTTP Traffic (HTTP 트래픽의 클라이언트측 어플리케이션별 분류)

  • Choi, Mi-Jung;Jin, Chang-Gyu;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1277-1284
    • /
    • 2011
  • Today, many applications use 80 port, which is a basic port number of HTTP protocol, to avoid a blocking of firewall. HTTP protocol is used in not only Web browsing but also many applications such as the search of P2P programs, update of softwares and advertisement transfer of nateon messenger. As HTTP traffics are increasing and various applications transfer data through HTTP protocol, it is essential to identify which applications use HTTP and how they use the HTTP protocol. In order to prevent a specific application in the firewall, not the protocol-level, but the application-level traffic classification is necessary. This paper presents a method to classify HTTP traffics based on applications of the client-side and group the applications based on providing services. We developed an application-level HTTP traffic classification system and verified the method by applying the system to a small part of the campus network.