• Title/Summary/Keyword: Document information management

Search Result 860, Processing Time 0.028 seconds

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

An Analytical Approach Using Topic Mining for Improving the Service Quality of Hotels (호텔 산업의 서비스 품질 향상을 위한 토픽 마이닝 기반 분석 방법)

  • Moon, Hyun Sil;Sung, David;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.21-41
    • /
    • 2019
  • Thanks to the rapid development of information technologies, the data available on Internet have grown rapidly. In this era of big data, many studies have attempted to offer insights and express the effects of data analysis. In the tourism and hospitality industry, many firms and studies in the era of big data have paid attention to online reviews on social media because of their large influence over customers. As tourism is an information-intensive industry, the effect of these information networks on social media platforms is more remarkable compared to any other types of media. However, there are some limitations to the improvements in service quality that can be made based on opinions on social media platforms. Users on social media platforms represent their opinions as text, images, and so on. Raw data sets from these reviews are unstructured. Moreover, these data sets are too big to extract new information and hidden knowledge by human competences. To use them for business intelligence and analytics applications, proper big data techniques like Natural Language Processing and data mining techniques are needed. This study suggests an analytical approach to directly yield insights from these reviews to improve the service quality of hotels. Our proposed approach consists of topic mining to extract topics contained in the reviews and the decision tree modeling to explain the relationship between topics and ratings. Topic mining refers to a method for finding a group of words from a collection of documents that represents a document. Among several topic mining methods, we adopted the Latent Dirichlet Allocation algorithm, which is considered as the most universal algorithm. However, LDA is not enough to find insights that can improve service quality because it cannot find the relationship between topics and ratings. To overcome this limitation, we also use the Classification and Regression Tree method, which is a kind of decision tree technique. Through the CART method, we can find what topics are related to positive or negative ratings of a hotel and visualize the results. Therefore, this study aims to investigate the representation of an analytical approach for the improvement of hotel service quality from unstructured review data sets. Through experiments for four hotels in Hong Kong, we can find the strengths and weaknesses of services for each hotel and suggest improvements to aid in customer satisfaction. Especially from positive reviews, we find what these hotels should maintain for service quality. For example, compared with the other hotels, a hotel has a good location and room condition which are extracted from positive reviews for it. In contrast, we also find what they should modify in their services from negative reviews. For example, a hotel should improve room condition related to soundproof. These results mean that our approach is useful in finding some insights for the service quality of hotels. That is, from the enormous size of review data, our approach can provide practical suggestions for hotel managers to improve their service quality. In the past, studies for improving service quality relied on surveys or interviews of customers. However, these methods are often costly and time consuming and the results may be biased by biased sampling or untrustworthy answers. The proposed approach directly obtains honest feedback from customers' online reviews and draws some insights through a type of big data analysis. So it will be a more useful tool to overcome the limitations of surveys or interviews. Moreover, our approach easily obtains the service quality information of other hotels or services in the tourism industry because it needs only open online reviews and ratings as input data. Furthermore, the performance of our approach will be better if other structured and unstructured data sources are added.

A Study on eDesign Platform for Effective Communication and Information sharing - with an emphasis on process and template (효과적인 커뮤니케이션과 정보공유를 위한 e디자인 플랫폼 구축에 관한 연구 - 프로세스와 템플릿을 중심으로)

  • 윤주현
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.425-436
    • /
    • 2004
  • A new design field called eDesign appears as if eBiz is an online related business in which an industrialized design creates the individual value added facing a digital revolution. The field of eDesign requires a special design process and management methodology regardless of the fact that human sensitivity will be satisfied through a dehumanized computer technique. However, it is the reality of eDesign that has been dependent upon a simple process or project management tool of general design. In this study, we develop an eDesign platform based on an eDesign process and template mainly focused on eBusiness in order to overcome the wrong situation. The template is a kind of document that has a standardization form. We aim to establish a general process through various case projects, store information using a necessary template, and use for the way of visual communication. We propose a standard of eDesign platform that can be widely applied to the field of design, medium and small enterprises focused on IT businesses or design-team through this project performed as an educational-industrial study. It makes it possible to get a detailed process methodology, which can be applied to many small design related companies that don't have their own process yet, and will be a scale for comparing their own process in which the company has a process of opened standard eDesign with it. In addition, it makes possible a systematic control of the own projects within and outside the firm, accumulating information for the firm through the database, and easy communication. Furthermore, it can be applied to check the process of the project as a checklist, and then it will reduce trial and error repeated for every project that has been done.

  • PDF

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

Development of Standard Process for Private Information Protection of Medical Imaging Issuance (개인정보 보호를 위한 의료영상 발급 표준 업무절차 개발연구)

  • Park, Bum-Jin;Yoo, Beong-Gyu;Lee, Jong-Seok;Jeong, Jae-Ho;Son, Gi-Gyeong;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.32 no.3
    • /
    • pp.335-341
    • /
    • 2009
  • Purpose : The medical imaging issuance is changed from conventional film method to Digital Compact Disk solution because of development on IT technology. However other medical record department's are undergoing identification check through and through whereas medical imaging department cannot afford to do that. So, we examine present applicant's recognition of private intelligence safeguard, and medical imaging issuance condition by CD & DVD medium toward various medical facility and then perform comparative analysis associated with domestic and foreign law & recommendation, lastly suggest standard for medical imaging issuance and process relate with internal environment. Materials and methods : First, we surveyed issuance process & required documents when situation of medical image issuance in the metropolitan medical facility by wire telephone between 2008.6.1$\sim$2008.7.1. in accordance with the medical law Article 21$\sim$clause 2, suggested standard through applicant's required documents occasionally - (1) in the event of oneself $\rightarrow$ verifying identification, (2) in the event of family $\rightarrow$ verifying applicant identification & family relations document (health insurance card, attested copy, and so on), (3) third person or representative $\rightarrow$ verifying applicant identification & letter of attorney & certificate of one's seal impression. Second, also checked required documents of applicant in accordance with upper standard when situation of medical image issuance in Kyung-hee university medical center during 3 month 2008.5.1$\sim$2008.7.31. Third, developed a work process by triangular position of issuance procedure for situation when verifying required documents & management of unpreparedness. Result : Look all over the our manufactured output in the hospital - satisfy the all conditions $\rightarrow$ 4 place(12%), possibly request everyone $\rightarrow$ 4 place(12%), and apply in the clinic section $\rightarrow$ 9 place(27%) that does not medical imaging issuance office, so we don't know about required documents condition. and look into whether meet or not the applicant's required documents on upper 3month survey - satisfy the all conditions $\rightarrow$ 629 case(49%), prepare a one part $\rightarrow$ 416 case(33%), insufficiency of all document $\rightarrow$ 226case(18%). On the authority of upper research result, we are establishing the service model mapping for objective reception when image export situation through triangular position of issuance procedure and reduce of friction with patient and promote the patient convenience. Conclusion : The PACS is classified under medical machinery that mean indicates about higher importance of medical information therefore medical information administrator's who already received professional education & mind, are performer about issuance process only and also have to provide under ID checking process exhaustively.

  • PDF

Standardization and Management of Interface Terminology regarding Chief Complaints, Diagnoses and Procedures for Electronic Medical Records: Experiences of a Four-hospital Consortium (전자의무기록 표준화 용어 관리 프로세스 정립)

  • Kang, Jae-Eun;Kim, Kidong;Lee, Young-Ae;Yoo, Sooyoung;Lee, Ho Young;Hong, Kyung Lan;Hwang, Woo Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.679-687
    • /
    • 2021
  • The purpose of the present study was to document the standardization and management process of interface terminology regarding the chief complaints, diagnoses, and procedures, including surgery in a four-hospital consortium. The process was proposed, discussed, modified, and finalized in 2016 by the Terminology Standardization Committee (TSC), consisting of personnel from four hospitals. A request regarding interface terminology was classified into one of four categories: 1) registration of a new term, 2) revision, 3) deleting an old term and registering a new term, and 4) deletion. A request was processed in the following order: 1) collecting testimonies from related departments and 2) voting by the TSC. At least five out of the seven possible members of the voting pool need to approve of it. Mapping to the reference terminology was performed by three independent medical information managers. All processes were performed online, and the voting and mapping results were collected automatically. This process made the decision-making process clear and fast. In addition, this made users receptive to the decision of the TSC. In the 16 months after the process was adopted, there were 126 new terms registered, 131 revisions, 40 deletions of an old term and the registration of a new term, and 1235 deletions.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Relation between self-efficacy and health promotion behavior of elementary school students (초등학생의 자기효능감과 건강증진행위와의 관계)

  • Kang, Moon-Jeong;Park, Young-Soo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.5
    • /
    • pp.43-70
    • /
    • 2004
  • This research was conducted to provide basic document on efficient health promotion behavior program that elementary school students can use from elementary school course to enhance health promotion behavior for healthy life by checking out the degree of the most influential factor for health promotion behavior about elementary school students who establish lifelong health habit, and by checking out the relation between the degree of self-efficacy and health promotion behavior. The number of subjects of this research was 598. They were all elementary school students from the sixth grade students of the 5 cities of the Kyeong Nam province. We conducted questionnaires and did statistical analyses by using 592 papers which were suitable for date analyses with SPSS. The conclusions were as follows; A. The degree of self-efficacy The degree of self-efficacy of elementary school students was more than average. The degree of self-efficacy on physical activity was the highest and the degree of self-efficacy on self-fulfillment was the lowest. The degree of self-efficacy of girl students was comparatively higher than that of boy students. When their parents got higher education, made a lot of money and kept harmony with their children, the degree of self-efficacy became high. Furthermore, when their parents or themselves have a lot of interest in health, they feel that they are healthy, and they feel that they are satisfied with their bodies, the degree of self-efficacy was high too. B. The degree of health promotion behavior Although the degree of health promotion behavior of elementary school students was a bit lower than the degree of self-efficacy, it was higher than average. The degree of health promotion behavior on physical activity was the highest. But the degree of health promotion behavior on health of their own was the lowest. The degree of health promotion behavior between girl students and boy students was the same. When their parents got higher education, made a lot of money and kept harmony with their children, the degree of self-efficacy became high. Furthermore, when their parents or themselves have a lot of interest In health, they feel that they are healthy, and they feel that they are satisfied with their bodies, the degree of self-efficacy was high too. C. The relation between self-efficacy and health promotion behavior When the degree of self-efficacy was high, the degree of health promotion behavior was high too. So there was high positive relationship between self-efficacy and health promotion behavior. Physical activity showed the highest relationship. The order of strong relationship run as follows. Relationship with others, self-fulfillment, management of stress. The higher self-efficacy which was a recognizable factor on health behavior, the higher the degree of health promotion behavior. It is being revealed that many modem chronic diseases are cause by accumulated careless attitude on harmful health habit and lack of self-control. The behavior of keeping healthy and enhancing health is more firm when they have high self-efficacy which is believing their own conviction. So, When we teach elementary school students health promotion education at school, we should try to enhance their own self-efficacy rather than just instill simple information about health. By doing so, we can help them change their attitude on health. Then, they could enjoy life-long healthy life.

  • PDF

Risk of Breast Cancer and Total Malignancies in Rheumatoid Arthritis Patients Undergoing TNF-α Antagonist Therapy: a Meta-analysis of Randomized Control Trials

  • Liu, Yang;Fan, Wei;Chen, Hao;Yu, Ming-Xia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.8
    • /
    • pp.3403-3410
    • /
    • 2014
  • Context: Interest exits in whether TNF-alpha antagonists increase the risk of breast cancer and total malignancies in patients with rheumatoid arthritis (RA). Objectives: To analyze the risk of malignancies, especially breast cancer, in patients with RA enrolled in randomized control trials (RCTs). Methods: A systematic literature search for RCTs from 1 January 1998 to 1 July 2013 from online databases, such as PubMed, WILEY, EMBASE, ISI web of knowledge and Cochrane Library was conducted. Studies included RCTs that compared the safety of at least one dose of the five TNF-${\alpha}$ antagonists with placebo or methotrexate (MTX) (or TNF-${\alpha}$ antagonists plus MTX vs placebo plus MTX) in RA patients for more than 24 weeks and imported all the references into document management software EndNote${\times}6$. Two independent reviewers selected studies and extracted the data about study design, patients' characteristics and the type, number of all malignancies. Results: 28 RCTs from 34 records with 11,741 patients were analyzed. Of the total, 97 developed at least one malignancy during the double-blind trials, and breast cancer was observed in 17 patients (17.5% of total malignancies). However, there was no statistically significant increased risk observed in either the per protocol (PP) model (OR 0.65, 95%CI [0.22, 1.93]) or the modified intention to treat (mITT) model (OR 0.75, 95%CI [0.25, 2.21]). There were also no significant trend for increased risk of total malignancies on anti-TNF-${\alpha}$ therapy administered at approved doses in either model (OR, 1.06, 95%CI [0.64, 1.75], and OR, 1.30, 95%CI [0.80, 2.14], respectively). As to the two models, modified intention to treat model analysis led to higher estimation than per protocol model analysis. Conclusions: This study did not find a significantly increased risk of breast cancer and total malignancies in adults RA patients treated with TNF-${\alpha}$ antagonists at approved doses. However, it cannot be ignored that more patients developed malignancies with TNF-${\alpha}$ antagonists therapy compared with patients with placebo or MTX, in spite of the lack of statistical significance, so that more strict clinical trials and long-term follow-up are needed, and both mITT and PP analyses should be used in such safety analyses.

XML Schema Evolution Approach Assuring the Automatic Propagation to XML Documents (XML 문서에 자동 전파하는 XML 스키마 변경 접근법)

  • Ra, Young-Gook
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.641-650
    • /
    • 2006
  • XML has the characteristics of self-describing and uses DTD or XML schema in order to constraint its structure. Even though the XML schema is only at the stage of recommendation yet, it will be prevalently used because DTD is not itself XML and has the limitation on the expression power. The structure defined by the XML schema as well as the data of the XML documents can vary due to complex reasons. Those reasons are errors in the XML schema design, new requirements due to new applications, etc. Thus, we propose XML schema evolution operators that are extracted from the analysis of the XML schema updates. These schema evolution operators enable the XML schema updates that would have been impossible without supporting tools if there are a large number of XML documents complying the U schema. In addition, these operators includes the function of automatically finding the update place in the XML documents which are registered to the XSE system, and maintaining the XML documents valid to the XML schema rather than merely well-formed. This paper is the first attempt to update XML schemas of the XML documents and provides the comprehensive set of schema updating operations. Our work is necessary for the XML application development and maintenance in that it helps to update the structure of the XML documents as well as the data in the easy and precise manner.