• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.024 seconds

The Use of Artificial Intelligence in Healthcare in Medical Image Processing

  • Elkhatim Abuelysar Elmobarak
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • AI or Artificial Intelligence has been a significant tool used in the organisational backgrounds for an effective improvement in the management methods. The processing of the information and the analysis of the data for the further achievement of heightened efficiency can be performed by AI through its data analytics measures. In the medical field, AI has been integrated for an improvement within the management of the medical services and to note a rise in the levels of customer satisfaction. With the benefits of reasoning and problem solving, AI has been able to initiate a range of benefits for both the consumers and the medical personnel. The main benefits which have been noted in the integration of AI would be integrated into the study. The issues which are noted with the integrated AI usage for the medical sector would also be identified in the study. Medical Image Processing has been seen to integrate 3D image datasets with the medical industry, in terms of Computed Tomography (CT) or Magnetic Resonance Imaging (MRI). The usage of such medical devices have occurred in the diagnosis of the patients, the development of guidance towards medical intervention and an overall increase in the medical efficiency. The study would focus on such different tools, adhered with AI for increased medical improvement.

A Basic Study on the Fire Flame Extraction of Non-Residential Facilities Based on Core Object Extraction (핵심 객체 추출에 기반한 비주거 시설의 화재불꽃 추출에 관한 기초 연구)

  • Park, Changmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.71-79
    • /
    • 2017
  • Recently, Fire watching and dangerous substances monitoring system has been being developed to enhance various fire related security. It is generally assumed that fire flame extraction plays a very important role on this monitoring system. In this study, we propose the fire flame extraction method of Non-Residential Facilities based on core object extraction in image. A core object is defined as a comparatively large object at center of the image. First of all, an input image and its decreased resolution image are segmented. Segmented regions are classified as the outer or the inner region. The outer region is adjacent to boundaries of the image and the rest is not. Then core object regions and core background regions are selected from the inner region and the outer region, respectively. Core object regions are the representative regions for the object and are selected by using the information about the region size and location. Each inner region is classified into foreground or background region by comparing its values of a color histogram intersection of the inner region against the core object region and the core background region. Finally, the extracted core object region is determined as fire flame object in the image. Through experiments, we find that to provide a basic measures can respond effectively and quickly to fire in non-residential facilities.

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

A Study on the Effect of Industrial Category and Organizational Characterisitics on the Use of IT Infrastructure Services (산업유형과 조직특성 요인이 정보기술 인프라스트럭처 서비스 이용에 미치는 영향에 관한 연구)

  • Choi, Jae Young;Kim, Hyeon Seop
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.71-87
    • /
    • 2008
  • In order to survive in a competitive environment, many companies are taking much interest in building IT infrastructure and are investing in that area. But, despite of all the interest and investments, many companies are unsatisfied and confused because of the lack of guidance and understandings of IT infrastructure. Therefore the purpose of this study is to prove that the level of IT usage is different according to organizational characteristics and industrial categories, and to give a guideline to companies' planning on newly building IT infrastructure. In conclusion, companies newly planning on building IT infrastructure should consider the amount of information technology functional uses according to the organizational characteristics and industrial category and they follow the below guidelines. On building the IT infrastructure the organization having the characteristics of formalization should consider and provide the standardization function first. The companies having the characteristics of decentralization should consider and provider firstly the application and communication function. And the companies having the characteristics of specialization should consider and provider the security function.

Hazardous Factors and Accident Severity of Cabling Work in Telecommunications Industry

  • Kim, Yang Rae;Park, Myoung Hwan;Jeong, Byung Yong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.3
    • /
    • pp.155-163
    • /
    • 2016
  • Objective: This study aims to draw the characteristics of occupational accidents occurred in cabling work, and assess accident severity based on occupational injury data. Background: Accident factors and accident risk are different by the place of work in cabling work. Field managers require information on accident prevention that can be easily understood by workers. However, there has been a lack of studies that focus on cabling work in Korea. Method: This study classifies 450 injured persons caused in cabling work by process, and analyzes the characteristics of occupational injuries from the aspects of age, work experience and accident type. This study also analyzes accident frequency and severity of injury. Results: Results show that preparing/finishing (33.3%) was the most common type of cabling process in injuries, followed by maintenance (28.4%), routing/income (23.1%) and wiring/installation (15.1%) process. The critical incidents in the level of risk management were falls from height in the routing/incoming process, and falls from height in the maintenance process. And, incidents ranked as 'High' level of risk management were slips and trips, fall from height and vehicle incident in the preparing/finishing process, and fall from height in the wiring/installation process. Conclusion and Application: The relative frequency of accident and its severity by working process serve as important information for accident prevention, and are critical for determining priorities in preventive measures.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Blockchain Technology and Network Structure for Real-time Intelligence Transport System (실시간 지능형 교통 시스템에 적합한 블록체인 기술 및 네트워크 구조)

  • Kim, Moonseong;Na, Eunchan;Lee, Janghoon;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.17-26
    • /
    • 2018
  • Connected car plays an important role on Intelligent Transport System (ITS). ITS is able to secure drivers' convenience and safety, however, the overall system can be threatened by hacking attempt. Blockchain is one strong candidate of the remedy to promote the security of the ITS network. However, there will be many challenges to adopt previously proposed blockchain technologies to ITS. This work presents a new ITS structure based on blockchain technology. Proposed scheme includes three major layers. The first layer is central manager which is initiated once to register a certain connected car. The third layer is RSU (Road Side Unit) layer which exploits PoS (Proof of Stake) for consortium blockchains and retains real-time information. In addition, this layer performs block expiration based on timers to maintain manageable block length. In the second layer, the generated blocks of the third layer without expiration are housed as private blockchains. We finally demonstrate possible merits of newly proposed scheme.

A Study on the Effect of Online Travel Distribution's Brand Community Characteristics on Product Purchase Intention

  • LU, Lianghui;KANG, Min-Jung;SUN, Pengchang
    • Journal of Distribution Science
    • /
    • v.21 no.1
    • /
    • pp.107-117
    • /
    • 2023
  • Purpose: This study attempted to confirm the mediating effect of brand experience and to travel brand community satisfaction in the relationship between the characteristics of brand community contents and travel product purchase intention. This study also investigated the moderating role of consumer characteristics. Research design, data and methodology: Based on a total of 381 bytes of data, hypothesis verification was conducted using Smart-PLS 3.2.8 statistical package programs. Results: First, the content community travel brand attributes, personal affordability and creativity are a lingering fragrances on the intended consumers ' shopping trip. Second, information provision, interaction, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through brand community satisfaction. Third, playfulness, vitality, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through double mediation of the experience and community satisfaction of brand. Conclusions: Tourism industry managers should be able to market content by forming their own brand community. It is necessary to create an environment in which tourism industry managers can use social media travel brand community content to give discounts to consumers, provide creative, playful and vivid travel information.

Changing Partners Technique in Reversible Steganography

  • Woo, Jae-Hyeon;Cho, Weon-Jin
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.6 no.3
    • /
    • pp.25-34
    • /
    • 2007
  • Steganography is hiding messages in cover materials like image, audio, etc. The previous studies are limited in the shifting problem of the histogram and capacity. This paper proposes a new technology which overcomes these two problems. Our new technology uses two colors as a pair and chooses either changing to its partner or remaining as they are according as each hiding bit. As a result, we show that the result of this technology shows that the hiding capacity is higher than other methods.

  • PDF

Implementation of Patient Supervision System Using USN and Healthcare board (USN과 헬스 케어 보드를 이용한 환자 감시 시스템 구현)

  • Lee, Cheol-Hee;Lee, Sand-Hoi
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.141-142
    • /
    • 2008
  • According as USN's application field is magnified, various results are appearing. Efforts to apply this results in life are progressing. In car field, is used in control that level of significance is less. In home network, is used in a household electric appli-ance control and electric lamp control, security etc.. In factory, is used in process control, and is used in various application because is involved with RFID leader recently. In this paper, patient's status monitoring, USN use wish to. Because USN can utilize existent network, it is system that can transmit various data as that change passed information.Wish to send information that get in health-care board. Information that can get in health-care board is blood pressure, blood sugar, stroke, SPO2, ECG, the activity amount, position. Also, wish to forecast use possibility to involved various service, silver industry with database.

  • PDF