• Title/Summary/Keyword: 체계 연동

Search Result 494, Processing Time 0.034 seconds

Development of Abnormal Situation Managenet System in Process-centric Way for Enhancing Patient Safety (환자 안전 제고를 위한 프로세스 중심적인 이상상황 관리 시스템 개발)

  • Moon, Junho;Kim, Dongsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • As ubiquitous computing technologies have advanced rapidly, context awareness technology has been used in the medical part in order to improve patient safety. Nevertheless, as there is no method for managing context awareness information effectively and managing healthcare processes for handling abnormal situations systematically, it is highly required to enhance patient safety in hospital. We propose an innovative system to solve these problems. The proposed system has three main functionalities. Firstly, it enables all situations to be recognized in medical organizations. Secondly, it extracts the meaningful data from data flood by defining data patterns of recognized situations and designing a rule-based system. Lastly, it can manage patients' abnormal situations in process-centric way by integrating the business process management system. It is expected that the proposed system contributes to the improvement of patient safety in u-hospital.

Design and Implementation of Mind map program using Open API (오픈 API를 이용한 마인드맵 프로그램의 설계 및 구현)

  • Lee, Seon-Ung;Lee, Hye-Rim;Kim, Yoo-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.134-141
    • /
    • 2009
  • In this paper, it is proposed a mind map program using open API to provide mashup function. Web paradigm is changing to Web 2.0. So mashup using open API is much applied. Mashup is good method for not only web service, but making new ideas or informations. It is mind map that was made systematical like this method. In this paper, a mind map application based on mobile that provides mashup function implemented for modern people that mostly process their business during movement.

  • PDF

Conceptual Design on the ISDN Service Node for Multi-party Connection Services -Part II. A Study on the Control Procedures for the Service Node - (ISDN에서의 다자간 접속 서비스 제공을 위한 서비스노드의 개념적 설계 - 제2부 : 서비스노드 제어절차에 관한 연구 -)

  • 옥승수;강민석;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.242-253
    • /
    • 1994
  • For the implementation of a Service Node, which is proposed in the companion paper to provide multiparty conference type sevices in the ISDN, we define some technical aspects such as connection control, service control procedure and control messages in this paper. Additional connection control procedures for the multiparty connections are annexed to the CCITT Rec. Q.931 and Q.764 for the ISDN subscriber and common channel interoffice signaling. A new set of service control procedures is also established according to the necessary service control functions. The messages for these procedures are formatted using user-to-user signaling parts of Q.931 and Q.763 messages not to affect on the existing signaling system. Some technical requirements of subscriber terminal for the multiparty services are also deduced.

  • PDF

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

Automatic post address print out system based on QRcode or CVS (QR 코드 및 CVS 기반 주소지 자동 기표지 출력 시스템)

  • Choi, Jae-Ho;Jeong, Yang-Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.113-118
    • /
    • 2016
  • This study found that there are problems in sending mails at the postal service reception desks and proposes a system which transmits address information to POSNET(the terminals at post office reception) without the use of an additional security system based on address information which is stored in the terminals of mobile phones. The system proposed transforms the information of users into two-dimensional barcode(QR code) of the POSNET and a number of address information is texturized and transmitted to the POSNET with the use of how to read QR code and LAN such as bluetooth. When the system proposed is connected to the postal reception system, it can create and output mail addresses for mobile computers automatically and contribute to better performance for the post office reception clerks and better economic results.

WPAN Based Semantic-Web Health Monitoring (WPAN기반 시멘틱 웹 헬스 모니터링)

  • Lim, Myung-Jae;Kim, Myung-Gwon;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In recent years, mobile healthcare systems that transfer patient data wirelessly have been used in the medical field. However, the current messages supported to patients are difficult to satisfy the specific patients, and there is a lack of healthcare systems to help manage patients with diabetes or pregnant women on a regular basis. In this regard, this paper demonstrates that the semantic-web service to which data transfer method, application framework and networking of WPAN are applied can be implemented. In addition, it suggests common data types to integrate data from a variety of sources and provides a common framework in which information on the Web can be shared and reused in applications, businesses and communities, etc. As an example, the healthcare monitoring that can manage healthcare for pregnant women, which includes confirmation of pregnancy, periodic health management, fetal movement, prenatal care and health-related knowledge, is proposed.

Design of data integration for marine transportation facilities (해양교통시설의 데이터 통합 시스템 설계)

  • Jang, Hyun-Young;jang, jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.333-336
    • /
    • 2015
  • The high tech marine transportation infrastructure is an innovative that may be able to secure a safe transportation environment. The current sea route sign system based on an electronic marine chart only has a data manufacture specification for uses at ECDIS. Therefore, it has a limitation in expressing various sea route data and falls short of productivity as it is frozen to prevent being changed for a long time. Also, it cannot satisfy requirements from high tech such as lattice structure data and time series information. Currently, although it builds each independent operation system based S-57, it has been found that it is the most important requirement from consumers that the entire monitoring system can mutually interwork by standardizing and uniting formats of all protocols. In addition, current status information and alarm system is using AIS, TRS, WCDMA telecommunication and processing all the data after saving it into each different server. In this thesis, we will realize the status information and alarm system of Marine transportation facilities which is a sea route sign system based on S-63 electronic marine chart, S/W, after uniting each different protocol and making combined system.

  • PDF

A Semantic Web Service for Tourism Information over the Mobile Web (시맨틱 웹에 기초한 모바일 관광정보 서비스)

  • Lee, Yang-Won
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.5
    • /
    • pp.788-807
    • /
    • 2007
  • To better publish geographical information on the Web, it is important to capture how Web technologies are changing. For a recent decade, Semantic Web has been developed by incorporating ontologies into the current Web, with an aim to make computers understand rather than simply display. Ontology, an explicit specification of a conceptualization, and the Semantic Web grounded on the ontology, have the potential for effective sharing and appropriate retrieval of geographical information. This paper describes a Semantic Web Service over the mobile Web that can offer pertinent tourism information according to user contexts. To do this, a tourism ontology was formalized in the PARA(Place-Attraction-Resource-Activity) ontology model by organizing tourist places, tourist attractions, tourism resources, and activities. Locational relationships between tourist places were also included in the PARA ontology model to take into account the movements of tourists on a railway network. The XML(Extensible Markup Language) Web Service in the middle tier manages the client-side request for information retrieval and the corresponding server-side response from the data provider. The PARA ontology was integrated into the XML Web Service for the concept-based discovery of tourism information. The applicability of the proposed system was tested through a simulation experiment for Tokyo tourism.

The Study on a Security Safeguard Plan for SCADA Infrastructure (SCADA 시설에 대한 보안강화 방안에 관한 연구)

  • Chung, Yoon-Jung
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2006
  • The control system is accomplishing very important role in our life currently as the national critical Infrastructure and large scale industry plant. We manage SCADA system to manage generally the control system interconnected with the information system. The operating system of SCADA is changing also to the well-known OS like Windows or UNIX for offer various convenience and facility to the user. We offered the reason why such change of the system makes so that it is exposed to cyber terror. In the traditional SCADA system is managed safely by an isolated network system physically. It is the trend to increase gradually though a cyber terror possibility is thinner on a control system than a information system but the cyber terror gives a nation or community wide damage influence of large scale if it happens. Therefore this paper presents a security safeguard plan about SCADA system and helps prepare systematic security strategy and enhance the security level implement.

  • PDF