• Title/Summary/Keyword: Access Monitoring System

Search Result 396, Processing Time 0.026 seconds

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Implementation of the Disaster Monitering System with PLC/CDMA Environments (PLC/CDMA 환경에서의 재난 감시 시스템 구현)

  • Park, Sang-Hwan;Kim, In-Min;Yoon, Seon-Tae;Park, Ki-Won;Go, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.824-830
    • /
    • 2010
  • PLC_Zigbee system, implemented in a previous study, uses ZigBee Node based on PLC (Power Line Communication). The weak point of the system is that the long distance powerline communication and PLC is impossible to use in the areas where the powerline is not installed. In this paper, we added CDMA (Code Division Multiple Access) module using a data transfer method of SMS (Short Message Service) and XBee of WSN (Wireless Sensor Network) module to the previous system, and got around the restriction of place and environment of PLC system through the interfacing of each communication media. We, thus, implemented a wide range of real monitoring system.

FPGA Implementation of a Burst Cell Synchroniser for the ATM-PON Upstream (ATM-PON의 상향에서 버스트 셀 동기장치의 FPGA 구현)

  • Kim, Tae-Min;Chung, Hae;Shin, Gun-Soon;Kim, Jin-Hee;Sohn, Soo-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.1-9
    • /
    • 2001
  • In the APON(ATM Passive Optical Network), the transmission of the upstream traffic is based on a TDMA(Time Division Multiple Access) method that an OLT(Optical Line Termination) permits ONUs(Optical Network Units) sending cells by allocating time slots. Because the upstream is not a streaming mode, the cell synchronizer has to be operated in the burst mode. Also, the cell phase monitor is required to prevent collisions between cells which are transmitted by multiple ONUs through a single optical fiber. In this paper, a TDMA burst cell synchroniser is implemented with the FPGA(Field Programmable Gate Array) being used in the APON based on G.983.1 for transmitting upstream cells. It has two main functions which are the upstream data recovery and the phase monitoring. The former is to recover the upstream data and clock in the OLT by seeking the preamble which is the overhead of the upstream time slot and by aligning the phase of the bit and cell with the system clock. The latter is to provide the information to the ONU to compensate for the equalization delay by monitoring continuously the phase difference between adjacent cells to avoid the cell collision on the upstream.

  • PDF

ZigBee Wireless Sensor Nodes and Network For Wind Turbine Condition Monitoring (풍력발전기 상태 모니터링을 위한 ZigBee 무선 센서노드 및 네트워크)

  • Kim, Hyeon-Ho;Ahn, Sung-Bum;Choi, Sang-Jin;Pan, Jae-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4186-4192
    • /
    • 2012
  • Because wind turbines are larger and more off-shore construction due to economic and environmental factors, it is more difficult to access the wind turbine as well as the necessary parts and the maintenance costs are increasing. So, we need to minimize fault elements and to prevent a secondary accident at failure through monitoring to reduce maintenance costs and to increase reliability of operation. In this paper we have implemented ZigBee based wireless sensor nodes and network for wind turbine condition monitoring using temperature, humidity, voltage, current, wind direction, and wind speed sensors. ZigBee wireless sensor nodes signals are transmitted to a central monitoring system via routers. Also, the sensor signals are collected and processed using LabVIEW program to monitor the wind turbine conveniently. The administrators and users can monitor the condition of wind turbine at remote site in real time over TCP/IP.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

Digital Epidemiology: Use of Digital Data Collected for Non-epidemiological Purposes in Epidemiological Studies

  • Park, Hyeoun-Ae;Jung, Hyesil;On, Jeongah;Park, Seul Ki;Kang, Hannah
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.253-262
    • /
    • 2018
  • Objectives: We reviewed digital epidemiological studies to characterize how researchers are using digital data by topic domain, study purpose, data source, and analytic method. Methods: We reviewed research articles published within the last decade that used digital data to answer epidemiological research questions. Data were abstracted from these articles using a data collection tool that we developed. Finally, we summarized the characteristics of the digital epidemiological studies. Results: We identified six main topic domains: infectious diseases (58.7%), non-communicable diseases (29.4%), mental health and substance use (8.3%), general population behavior (4.6%), environmental, dietary, and lifestyle (4.6%), and vital status (0.9%). We identified four categories for the study purpose: description (22.9%), exploration (34.9%), explanation (27.5%), and prediction and control (14.7%). We identified eight categories for the data sources: web search query (52.3%), social media posts (31.2%), web portal posts (11.9%), webpage access logs (7.3%), images (7.3%), mobile phone network data (1.8%), global positioning system data (1.8%), and others (2.8%). Of these, 50.5% used correlation analyses, 41.3% regression analyses, 25.6% machine learning, and 19.3% descriptive analyses. Conclusions: Digital data collected for non-epidemiological purposes are being used to study health phenomena in a variety of topic domains. Digital epidemiology requires access to large datasets and advanced analytics. Ensuring open access is clearly at odds with the desire to have as little personal data as possible in these large datasets to protect privacy. Establishment of data cooperatives with restricted access may be a solution to this dilemma.

Development of a low-power remote monitoring module for set-net fish school based on WCDMA (WCDMA 기반의 저전력 정치망 어군 정보전송 모듈 개발)

  • Donggil LEE;Myungsung KOO;Gyeom HEO;Jiwon CHEONG;Hyohyuc IM;Jaehyun BAE
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.59 no.3
    • /
    • pp.206-214
    • /
    • 2023
  • Fish school monitoring technology is utilized for various purposes, such as boat fishing and resource surveys. With advancements in information and communication technology, this technology has expanded its application to remote areas. Its significance has grown in fishing sites, particularly for improving the efficiency and cost-effectiveness of set-net fishing. Set-net fishing gears are not limited to coastal areas, but are also installed in inland and remote sea regions. Consequently, fishermen require technology that allows them to quickly transmit information about approaching fish schools and enables them to perform long-term monitoring. The development of remote monitoring technology for set-net fish schools must consider crucial design factors such as communication range, transmission speed, power consumption of information modules, and operational expenses. In this study, we developed a low-power remote monitoring module for set-net fish school based on WCDMA. The module was specifically designed to minimize power consumption, allowing for communication over long distances and extended operation times in set-net fishing applications. Furthermore, we developed a web server software application that enables remote access to fish schools and provides real-time weather information. The performance of the developed module was evaluated through set-net fishing site application and experiments with moving ships on the sea. The experimental results demonstrated that the remote monitoring system, consisting of the developed low-power remote monitoring module for set-net fish school based on WCDMA and a fish finder, had an average power consumption of 4.6 W, a maximum communication range of 22.84 km, and a data transmission and reception rate of 98.79%. The maximum fish school information transmission and reception rate was 97.26%

A Development of Remote Medical Treatment System for Stroke Recovery using ZigBee-based Wireless Brain Stimulator and Internet (ZigBee 기반의 무선 뇌 자극기와 네트워크를 이용한 원격 뇌졸중 회복 시스템의 개발)

  • Kim, G.H.;Ryu, M.H.;Kim, J.J.;Kim, N.G.;Yang, Y.S.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.514-517
    • /
    • 2008
  • Ubiquitous healthcare (U-healthcare) system is one of potential applications of embedded system. Conventional U-healthcare systems are used in health monitoring or chronic disease care based on measuring and transmission of various vital signs. However, future U-healthcare system can be of benefit to more people such as stroke patients which have limited activity by providing them proper medical care as well as continuous monitoring. Recently, an electric brain stimulation treatments have been found to be a better way compared to conventional ones and many are interested in using the method toward the treatment of stroke. In this study, we proposed a remote medical treatment system using ZigBee-based wireless electric brain stimulator that can help them to get a treatment without visiting their doctors. The developed remote medical treatment system connects the doctors to the brain stimulator implanted in the patients via the internet and ZigBee communication built in the brain stimulator. Also, the system receive personal information of the connected patients and cumulate the total records of electric stimulation therapy in a database. Doctors can easily access the information for better treatment planning with the help of graphical visualization tools and management software. The developed remote medical treatment system can extend their coverage to outdoors being networked with hand-held devices through ZigBee.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF