• Title/Summary/Keyword: 관리 프레임워크

Search Result 1,202, Processing Time 0.026 seconds

Cox Model Improvement Using Residual Blocks in Neural Networks: A Study on the Predictive Model of Cervical Cancer Mortality (신경망 내 잔여 블록을 활용한 콕스 모델 개선: 자궁경부암 사망률 예측모형 연구)

  • Nang Kyeong Lee;Joo Young Kim;Ji Soo Tak;Hyeong Rok Lee;Hyun Ji Jeon;Jee Myung Yang;Seung Won Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.260-268
    • /
    • 2024
  • Cervical cancer is the fourth most common cancer in women worldwide, and more than 604,000 new cases were reported in 2020 alone, resulting in approximately 341,831 deaths. The Cox regression model is a major model widely adopted in cancer research, but considering the existence of nonlinear associations, it faces limitations due to linear assumptions. To address this problem, this paper proposes ResSurvNet, a new model that improves the accuracy of cervical cancer mortality prediction using ResNet's residual learning framework. This model showed accuracy that outperforms the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study. As this model showed accuracy that outperformed the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study, this excellent predictive performance demonstrates great value in early diagnosis and treatment strategy establishment in the management of cervical cancer patients and represents significant progress in the field of survival analysis.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

A Methodology for Determining Cloud Deployment Model in Financial Companies (금융회사 클라우드 운영 모델 결정 방법론)

  • Yongho Kim;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • As cloud services and deployment models become diverse, there are a growing number of cloud computing selection options. Therefore, financial companies need a methodology to select the appropriated cloud for each financial computing system. This study adopted the Balanced Scorecard (BSC) framework to classify factors for the introduction of cloud computing in financial companies. Using Analytic Hierarchy Process (AHP), the evaluation items are layered into the performance perspective and the cloud consideration factor and a comprehensive decision model is proposed. To verify the proposed research model, a system of financial company is divided into three: account, information, and channel system, and the result of decision making by both financial business experts and technology experts from two financial companies were collected. The result shows that some common factors are important in all systems, but most of the factors considered are very different from system to system. We expect that our methodology contributes to the spread of cloud computing adoption.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

A Review on the International Trends for Establishing Post-2020 National Targets Relevant to Protected Areas - Focused on the CBD Decisions and Aichi target-11 Achievement Status - (Post-2020 국가 보호지역 목표 설정을 위한 국제동향 고찰 - 생물다양성협약 결정문 및 글로벌 목표 성취현황 분석을 중심으로 -)

  • Heo, Hag Young
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.6
    • /
    • pp.601-609
    • /
    • 2020
  • This study aims to draw suggestions for establishing the Post-2020 national policy direction and goals related to protected areas in Korea by analyzing the trends of major discussion issues on protected areas in the Convention on Biological Diversity (CBD) and reviewing the achievement progress of the Aichi target-11. Regarding the CBD decisions on protected areas, two decisions (Decisions II/7 and II/8) were adopted in 1995, and then the Program of Work on Protected Areas (PoWPA), which presented an ideal blueprint for protected areas, was adopted at the 7th Conference of the Parties (COP) in 2004. At the 10th COP in 2010, the "Strategic Plan for Biodiversity 2011-2020 and the Aichi Biodiversity Target" (Decision X/2) was adopted along with the Decision X/31, which presented ten key issues related to protected areas. The global outcomes of the Aichi Target-11 include 15% of the earth's land area and 7.4% of the ocean being designated as protected areas. In Korea, 16.63% of the land and 2.12% of the ocean have been designated as protected areas. However, the outcomes of the effective and equitable management, protection of areas important to biodiversity and ecosystem services, and identifying "Other effective area-based conservation measures" (OECMs) and linking them with protected areas have been found to be significantly short of global goals. The first draft of the Post-2020 Global Biodiversity Framework (Post-2020 GBF) prepared in January 2020 presented multi-step objectives. They included protecting at least 60% of particularly important sites for biodiversity through protected areas and other effective area-based conservation measures, at least 30% of the entire land and sea areas, and at least 10% of them under strict protection by 2030. The Updated Zero drafted in August 2020 concisely set out one quantitative goal of at least 30% of the globe by 2030, adding qualitative goals that these areas should be protected and conserved through "well connected and effective system of protected areas and OECMs at least 30 % of the planet with the focus on areas particularly important for biodiversity." Based on the draft Post-2020 GBF's targets related to protected areas and Korea's national targets reflecting the current state of Korea and established national plans, we suggest the national targets "to protect and conserve at least 30% of the land area and 10% of the marine area and to strengthen the means of qualitative achievement by establishing sub-targets through an effective system of protected areas and OECMs by 2030.".

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

Identifying Antecedents of Service Innovation: Based on Service-Dominant Logic and Resource-Advantage Theory (서비스 혁신의 선행요인에 관한 연구: 서비스 지배적 논리와 자원 우위 이론을 중심으로)

  • Ryu, Hyun-Sun;Han, Jin Young
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.79-106
    • /
    • 2016
  • Service innovation is one means of gaining an advantage in a highly competitive environment. Although numerous studies have stressed the importance of service innovation, traditional good-dominant logic is still used in service innovation literature. Furthermore, few studies have been conducted on the link between service innovation and its antecedents in terms of service-oriented approach. To fill the gap, this article theoretically and empirically examines service innovation and its antecedents and consequences. Based on service-dominant logic and resource advantage theory, the current study aims to understand the effect of antecedents on service innovation as well as to identify the effect of service innovation on firm performance (i.e., non-financial and financial performance). Three service innovation activities, namely service creation-focused innovation, service delivery-focused innovation, and customer interaction-focused innovation, and four antecedents of service innovation, including human resource management capability, collaboration capability, marketing capability, and information technology capability, are identified based on Den Hertog (2000)'s service innovation framework. By using the empirical data collected from 189 service firms in Korea, this study explores the causal relationship among antecedents, service innovation and firm performance. Findings indicate that human resource management and marketing capabilities influence the three types of service innovation, whereas collaboration and information technology capabilities have a significant effect on both service creation-focused innovation and service delivery-focused innovation. In particular, human resource management capability is strongly related to customer interaction-focused innovation. The three types of service innovation have a positive influence on non-financial performance, whereas service delivery-focused innovation and customer interaction-focused innovation positively influence financial performance. These results support the crucial effects of antecedents, such as human resource management, collaboration, marketing and information technology capabilities, on service innovation.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.

A Case Study on Mechanism Factors for Result Creation of Informatization of IT Service Company (IT서비스 기업의 정보화 성과 창출을 위한 메커니즘 요인 사례 연구)

  • Choi, Hae-Lyong;Gu, Ja-Won
    • Management & Information Systems Review
    • /
    • v.36 no.5
    • /
    • pp.1-26
    • /
    • 2017
  • In the meantime, research on corporate informatization focuses on the completeness of information technology itself and its financial effects, so there is insufficient research on whether information technology can support business strategy. It is necessary to verify whether the management strategy implementation of the company can be led through the informatization of the enterprise and the relation between the main mechanism factors and the informatization performance. In this study, what a mechanism factor is applied in the process of result creation of informatization from three mechanism perspectives such as selecting mechanism, learning mechanism and coordinating mechanism with cases of representative domestic IT company and what an importance mechanism factors have been ascertained. This study results in 8 propositions. For a main agent of companies, securement of information capability of organizations has been selected to realize informatization results and investment of informatization has been selected to solve organizational decentralization problems as the most important factor. Additionally, as competition in the industry gets fierce, investment on informatization has been changed to a utility way of implementation of strategies and decision on investment has been made through the official process and information technology. Differentiated company capability has been made based on acquisition of technical knowledge and company information has been expanded to its whole employees through the information system. Also, informatization change management and outside subcontractor management have been acknowledged as an important adjustment factor of company. The first implication of this study is that since case studies on mechanism factors that preceding studies on informatization results did not empirically cover have directly been dealt with based on experiences of executives in charge of business and in charge of informatization, this study can provide practical views about factors that should be mainly managed for informatization results of IT companies. Secondly, since ser-M framework has been applied for IT companies for the first time, this study can academically contribute to companies in other fields about main mechanism factors for result creation of informatization based on deeper understanding and empirical cases.