• Title/Summary/Keyword: Design Environments

Search Result 3,159, Processing Time 0.031 seconds

A Study on the Design of DICOM Integration Engine in the Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 DICOM 설계에 대한 연구)

  • Im, In-Chul;Ha, An-Rye;Kim, Chang-Soo;Hwang, In-Chul;Ok, Chi-Sang
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.307-315
    • /
    • 2005
  • In the ubiquitous computing environments, ICT industries of current society are developed in enormous growth. Medicine or patients with mobile devices can access at any time, any place. The medical procedures at the patient bedside are out of the scope of current systems, which means that patient record and image data access during the medical visit or the execution, recording and confirmation of the medicine prescriptions, still do not enjoy computerized support. Today, the exchange of medical images and clinical information is well defined by DICOM and HL7 standards. The DICOM independent terminal equipment image access system was developed in which a DICOM Engine acts as the gateway between a PACS DB and user's terminal. Implementation system is compatible with most currently available Integration system models. This paper presents a software technology where the medical and nursing staff will be equipped with any device connected by wire and wireless to a central server that provides access to the electronic patient records and that will actively inform about tasks pending distribution. The prototype described in this article implements a medical images and structured reports server that makes the search and recovery of data stored in the DICOM standard possible.

  • PDF

Low Temperature Structural Tests of a Composite Wing with Room Temperature-Curing Adhesive Bond (상온접합 본딩이 있는 복합재 날개의 저온 구조시험)

  • Ha, Jae Seok;Park, Chan Yik;Lee, Kee Bhum
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.10
    • /
    • pp.928-935
    • /
    • 2015
  • This paper presents low temperature structural tests of a UAV wing which has room temperature-curing adhesive bond. The wing structure is made of carbon fiber reinforced composites, and the skins are bonded to the inner structures (such as ribs and spars) using room temperature-curing adhesive bond. Also, to verify damage tolerance design of the wing structure, barely visible impact damages are intentionally created in the critical areas. The attachment fittings of the wing are fixed in a specially designed chamber which can simulate the low temperature environments of the operating altitudes. The test load is applied by hydraulic actuators which are placed outside the chamber. The structural tests consist of strain survey tests and a durability test for 1-life fatigue load spectrum. During the tests, strains of major parts are measured by strain gauges and FBG sensors. The change of the initial impact damages is also monitored using piezoelectric sensors. The 1-life damage tolerance of the composite structure is verified by the structural tests under the simulated environments.

Review and Discussion on Policy and Legal System for River Environments Management in Korea (국가 하천환경관리 체계의 검토와 고찰)

  • Chun, Seung-Hoon
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.6
    • /
    • pp.431-444
    • /
    • 2017
  • This study was carried out to review the guidelines being used by law and national policy concerned on river environments management and suggest the applicability of newly developed river environment assessment system. In the current legal system, the national river environment management system is insufficient in securing an independent status in the legal institutional system which is separated to the Ministry of Land, Transport and Infrastructure and the Ministry of Environment. And the river environment assessment system of the national standard, which is a core matter, has not been established yet. In particular, there is a lack of integrated approach between the upper and lower plan or related plans on water resources, water quality, river environment and aquatic ecosystem management. In addition, the consistency and effectiveness as the process of planning and design according to the current status and comprehensive analysis and evaluation of the river environment were not secured either. To integrate national river environment management system and improve efficiency, I proposed the establishment of hierarchy and connection between national river plans, and the adoption and application of developed assessment system based on characteristics of river environment in Korea. Finally, I proposed the separated application with dividing the developed assessment system including the naturalness of river environment and suitability of water friendly activity into both assessment method for management plan of water resources of river basins & basic river plan respectively.

Designing mobile personal assistant agent based on users' experience and their position information (위치정보 및 사용자 경험을 반영하는 모바일 PA에이전트의 설계)

  • Kang, Shin-Bong;Noh, Sang-Uk
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.99-110
    • /
    • 2011
  • Mobile environments rapidly changing and digital convergence widely employed, mobile devices including smart phones have been playing a critical role that changes users' lifestyle in the areas of entertainments, businesses and information services. The various services using mobile devices are developing to meet the personal needs of users in the mobile environments. Especially, an LBS (Location-Based Service) is combined with other services and contents such as augmented reality, mobile SNS (Social Network Service), games, and searching, which can provide convenient and useful services to mobile users. In this paper, we design and implement the prototype of mobile personal assistant (PA) agents. Our personal assistant agent helps users do some tasks by hiding the complexity of difficult tasks, performing tasks on behalf of the users, and reflecting the preferences of users. To identify user's preferences and provide personalized services, clustering and classification algorithms of data mining are applied. The clusters of the log data using clustering algorithms are made by measuring the dissimilarity between two objects based on usage patterns. The classification algorithms produce user profiles within each cluster, which make it possible for PA agents to provide users with personalized services and contents. In the experiment, we measured the classification accuracy of user model clustered using clustering algorithms. It turned out that the classification accuracy using our method was increased by 17.42%, compared with that using other clustering algorithms.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.

Automation of Information Extraction from IFC-BIM for Indoor Air Quality Certification (IFC-BIM을 활용한 실내공기질 인증 요구정보 생성 자동화)

  • Hong, Simheee;Yeo, Changjae;Yu, Jungho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.18 no.3
    • /
    • pp.63-73
    • /
    • 2017
  • In contemporary society, it is increasingly common to spend more time indoors. As such, there is a continually growing desire to build comfortable and safe indoor environments. Along with this trend, however, there are some serious indoor-environment challenges, such as the quality of indoor air and Sick House Syndrome. To address these concerns the government implements various systems to supervise and manage indoor environments. For example, green building certification is now compulsory for public buildings. There are three categories of green building certification related to indoor air in Korea: Health-Friendly Housing Construction Standards, Green Standard for Energy & Environmental Design(G-SEED), and Indoor Air Certification. The first two types of certification, Health-Friendly Housing Construction Standards and G-SEED, evaluate data in a drawing plan. In comparison, the Indoor Air Certification evaluates measured data. The certification using data from a drawing requires a considerable amount of time compared to other work. A 2D tool needs to be employed to measure the area manually. Thus, this study proposes an automatic assessment process using a Building Information Modeling(BIM) model based on 3D data. This process, using open source Industry Foundation Classes(IFC), exports data for the certification system, and extracts the data to create an Excel sheet for the certification. This is expected to improve the work process and reduce the workload associated with evaluating indoor air conditions.

A Study on Smart Home Service System Design to Support Aging in Place (Aging in Place 지원을 위한 스마트 홈 서비스 시스템 설계에 관한 연구)

  • Sim, Sungho
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.249-254
    • /
    • 2019
  • According to the recent expansion of the network environment, the spread of smart devices is continuously increasing. With the spread of smart devices such as smart phones, smart pads and wearables, changes are taking place in smart technologies and IT convergence technologies. The development of smart technology is a key element of the 4th industrial technology. The Fourth Industrial Revolution expanded the new service-based industry by adding intelligence to residential, industrial and production environments using IT convergence and smart devices. Research on providing various services using smart technologies, such as smart home, smart factory, smart farm, and smart healthcare, is being conducted in variety. In particular, There is a sharp rise in smart homes due to the proliferation of IoT devices and the growth of sensor technology, control technology, applications, data management, and cloud services. Smart home services using smart technology provide residents with convenient, beneficial services and environments. Smart home service has complemented the existing home network service, but there still are flaws to be modified. In other words, the spread of smart devices, the development of service provider-oriented services, and the interlocking of services have limitations in providing services in consideration of user environment and user state. In order to solve this problem, this study proposes a smart home service system that considers the situation of the elderly.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

A Design of Wireless Sensor Node Using Embedded System (임베디드 시스템을 활용한 무선 센서 노드설계)

  • Cha, Jin-Man;Lee, Young-Ra;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.623-628
    • /
    • 2009
  • The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.

WebPR : A Dynamic Web Page Recommendation Algorithm Based on Mining Frequent Traversal Patterns (WebPR :빈발 순회패턴 탐사에 기반한 동적 웹페이지 추천 알고리즘)

  • Yoon, Sun-Hee;Kim, Sam-Keun;Lee, Chang-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.11B no.2
    • /
    • pp.187-198
    • /
    • 2004
  • The World-Wide Web is the largest distributed Information space and has grown to encompass diverse information resources. However, although Web is growing exponentially, the individual's capacity to read and digest contents is essentially fixed. From the view point of Web users, they can be confused by explosion of Web information, by constantly changing Web environments, and by lack of understanding needs of Web users. In these Web environments, mining traversal patterns is an important problem in Web mining with a host of application domains including system design and Information services. Conventional traversal pattern mining systems use the inter-pages association in sessions with only a very restricted mechanism (based on vector or matrix) for generating frequent k-Pagesets. We develop a family of novel algorithms (termed WebPR - Web Page Recommend) for mining frequent traversal patterns and then pageset to recommend. Our algorithms provide Web users with new page views, which Include pagesets to recommend, so that users can effectively traverse its Web site. The main distinguishing factors are both a point consistently spanning schemes applying inter-pages association for mining frequent traversal patterns and a point proposing the most efficient tree model. Our experimentation with two real data sets, including Lady Asiana and KBS media server site, clearly validates that our method outperforms conventional methods.