• Title/Summary/Keyword: 인터넷 관리 시스템

Search Result 2,666, Processing Time 0.033 seconds

Evaluation of Web Sites on Treatment of Childhood and Adolescent Obesity (국내 인터넷 웹사이트에 소개된 소아 및 청소년 비만치료의 실태 및 문제점)

  • Shin, Sang Won;Kim, Eun Young;Rho, Young Il;Yang, Eun Seok;Park, Sang Kee;Park, Young Bong;Moon, Kyung Rye
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.8 no.1
    • /
    • pp.49-55
    • /
    • 2005
  • Purpose: The purpose of this study was to evaluate the quality and problems of Web sites for management of childhood and adolescent obesity. Methods: We evaluated 203 Web sites identified from the search engine, Korean Yahoo, using the word of 'childhood and adolescent obesity'. 203 Web sites were classified according to medical institutions, health information Web sites, beauty shops. etc. We surveyed whether childhood and adolescent obesity distinguished with adult obesity was considered, or not. and researched the unique managements of childhood and adolescent obesity including the cardinal treatment. Results: Of the 203 Web sites, 157(77.3%) provided detailed information about treatment of obesity, 46(22.7%) provided only simple information about one. The sites providing detailed information were composed of 52.2% of oriental medicine clinics, 35.0% of clinic & hospitals including pediatric hospitals. Distribution of the sites about management of childhood and adolescent obesity distinguished with adult's one was only 23% of oriental medicine clinics, but 93% of childrens hospitals. Conclusion: Without considering the speciality of childhood obesity, inaccurate information are distributing on internet web sites. It is necessary for concern and development of advertizing system on the internet distributing accurate information about treatment of childhood obesity.

  • PDF

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Automatic Tagging Scheme for Plural Faces (다중 얼굴 태깅 자동화)

  • Lee, Chung-Yeon;Lee, Jae-Dong;Chin, Seong-Ah
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.11-21
    • /
    • 2010
  • To aim at improving performance and reflecting user's needs of retrieval, the number of researches has been actively conducted in recent year as the quantity of information and generation of the web pages exceedingly increase. One of alternative approaches can be a tagging system. It makes users be able to provide a representation of metadata including writings, pictures, and movies etc. called tag and be convenient in use of retrieval of internet resources. Tags similar to keywords play a critical role in maintaining target pages. However, they still needs time consuming labors to annotate tags, which sometimes are found to be a hinderance caused by overuse of tagging. In this paper, we present an automatic tagging scheme for a solution of current tagging system conveying drawbacks and inconveniences. To realize the approach, face recognition-based tagging system on SNS is proposed by building a face area detection procedure, linear-based classification and boosting algorithm. The proposed novel approach of tagging service can increase possibilities that utilized SNS more efficiently. Experimental results and performance analysis are shown as well.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.

Design of ICT based Protected Horticulture for Recovering Natural Disaster (ICT기반 시설원예 재해 경감장치 설계)

  • Lee, Meong-Hun;Yoe, Hyun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.10
    • /
    • pp.373-382
    • /
    • 2016
  • Under the Agricultural technology is influenced from climate that is requisite of seasonal. So this system will cover the problems and develop the agricultural industry as well. So far, the agricultural industry is developing however, it has the points of the weakness because of natural disasters such as wind risk and heavy snow. This paper designs system to change vinyl on the greenhouse. This is a preliminary study for the real-time feedback control of greenhouse. The study developed a wireless IoT sensor system based on authentic technology capacities, to integrate with the protected horticulture Management System. These system was used to evaluate the levels of the snow cover and wind through IoT devices. The existing greenhouse uses the warm water to clear snow or to change methods. This system will recover by changing the vinyl which is covered outside of the greenhouse. The points of the system is changing vinyl to spin pipe. It is contained extra vinyl. The effects of this system are minimized labor protected crops from natural disasters. For this purpose, the study first developed a wireless IoT sensor unit that integrates an MEMS device and wireless communication module. Also, the study developed an operating program that enables real-time response measurement. It will help operational and maintenance greenhouse as a result.

A Study of Statistical Learning as a CRM s Classifier Functions (CRM의 기능 분류를 위한 통계적 학습에 관한 연구)

  • Jang, Geun;Lee, Jung-Bae;Lee, Byung-Soo
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.71-76
    • /
    • 2004
  • The recent ERP and CRM is mostly focused on the conventional function performances. However, the recent business environment has brought the change in market due to the rapid progress of internet and e-commerce. It is mostly becoming e-business and spreading out as development of the relationship with other cooperating companies, the rapid progress of the relationship with customers, and intensification competitive power through the development of business progress in the organization. CRM(custom relationship management) is a kind of the marketing progress which forms, manages, and intensifies the relationship between the customers and companies to manage the acquired customers and increase the worth of customers for the company. It needs the system base which analyzes the information of customers since it functions on the basis of various information about customers and is linked to the business category such as producing, marketing, and decision making. Since ERP is extending its function to SCM, CRM, and SEM(strategic Enterprise Management), the 21 century s ERP develop as the strategy tool of e-business and, as the mediation for this, will subdivide the functions of CRM effectively by the analogic study of data. Also, to accomplish classification work of the file which in existing becomes accomplished with possibility work with an automatic movement with the user will be able to accomplish a more efficiently work the agent which in order leads the machine studying law, it is one thing with system feature.

An Improved Location Polling Algorithm for Location-Based Alert Services (위치기반 경보서비스를 위한 향상된 위치획득 알고리즘)

  • Song, Jin-Woo;Ahn, Byung-Ik;Lee, Kwang-Jo;Han, Jung-Suk;Yang, Sung-Bong
    • Journal of KIISE:Databases
    • /
    • v.37 no.1
    • /
    • pp.22-32
    • /
    • 2010
  • Location-based services have been expanded rapidly in local and overseas markets due to technological advances and increasing applications of wireless internet. Various researches have been made to manage efficiently the location information of moving objects. A basic location-based alert service provides alerting messages automatically when either entering or leaving a specific location and it is expected to become one of the most important location-based services. Location-based alert services require a location polling method to acquire current locations for a large number of moving objects. However, a simple periodical location polling method causes severe system overload because a system should keep updating location information of the moving objects ceaselessly. Most location polling algorithms for location-based alerting services are not suitable for mobile users with dynamic and unsteady moving patterns. In this paper, we propose an improved location polling algorithm for location-based alerting services to reduce the amount of location information acquisition and therefore, to decrease the system load. Various experiments show that the proposed algorithm outperforms other algorithms.

The Experience of Cancer Survivor's Return to Everyday Life (암 생존자의 일상생활 복귀 경험)

  • Kim, Seon-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.327-336
    • /
    • 2020
  • This study was undertaken to identify ways that enable a successful comeback to everyday life and improvement in the quality of life, by understanding the experiences of cancer survivors in returning to everyday life. Totally, 19 people diagnosed with complete cure after 5 years of cancer treatment, were recruited for the study. Data was collected through in-depth interviews from January 18 to February 25, 2017. One-time interviews took 90 to 120 minutes, and data analysis was achieved by applying the grounded theory. The central phenomenon of 'reality that cannot be escaped' and 'uncertain reality that cannot know tomorrow' was attributed to the causal conditions 'hard reality', 'physical exhaustion', 'psychological exhaustion' and 'economic exhaustion'. Depending on context conditions such as 'lack of family support', 'shift to a vulnerable working class', 'insufficient support system', 'hope for the societal support system', 'daunted gender', 'prejudice against cancer/cancer patients', 'information on life after rare full healing'. The strategy for a successful return was influenced by intervention conditions such as 'robust family fence' and 'effective cancer insurance', which resulted in 'building a new life' or 'enduring'. We conclude that for a successful return to daily lives, cancer survivors require comprehensive information, health and social-welfare interventions.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.