• Title/Summary/Keyword: Personal Information Management System

Search Result 753, Processing Time 0.025 seconds

A Study on the Analysis of Ship Officers' Collision-Avoidance Behavior During Maritime Traffic Simulation (해상교통분석 시뮬레이션을 위한 항해사의 충돌회피 행동분석에 관한 연구)

  • Kim, Hongtae;Ahn, Young-Joong;Yang, Young-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.44 no.6
    • /
    • pp.469-476
    • /
    • 2020
  • Modeling and Simulation (M&S) systems which deal with situational complexity often require human involvement due to the high-level decision-making that is necessary for ship movement, navigation, control center management, shipping company logistics, meteorological system information, and maritime transportation GIS. In order to properly simulate maritime traffic, it is necessary to accurately model the human decision-making process of the ship officer, including aspects of the ship officer's behavioral tendencies, personal navigation experience, and pattern of voyage errors, as this is the most accurate way in which to reproduce and predict realistic maritime traffic conditions. In this paper, which looks at agent-based maritime traffic simulation, we created a basic survey in order to conduct behavior analysis on ship operators' collision avoidance strategies. Using the information gathered throughout the survey, we developed an agent-based navigational behavior model which attempts to capture the behavioral patterns of a ship officer during an instance of ship collision. These results could be used in the future in further developments for more advanced maritime traffic simulation.

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

PDA Transmission of Medical Images by CDMA (CDMA에 의한 의료영상의 PDA전송)

  • Lee, Myong-Ho;Lim, Jae-Dong;Ahn, Bung-Ju;Lee, Hwun-Jae;Lee, Sang-Bock
    • Journal of the Korean Society of Radiology
    • /
    • v.1 no.2
    • /
    • pp.13-22
    • /
    • 2007
  • The purpose of this study was to survey a development of the wireless transmission system of medical images for ubiquitous medicine. There have been many changes in medical equipments and medical record medical treatment and medical record within hospital and PACS(Picture Archiving Communication System) which is picture management system for patients can be typical cases. It is difficult to use these automated medical systems unless they are within hospital and in case of rapid image reading in the emergency cases or in absence of doctor, it is difficult to perform it immediately. The present study implemented an image transmission system using CDMA connection so that images in the server can be viewed at any time and in any place. Remote wireless diagnosis based on medical images using PDA is applicable to medical areas that require mobility, and the use of PDA can be an ideal alternative for point of care. The use of PDA enables prompt and accurate access to digital medical images, which in turn reduces medical accidents and improves the quality of medical services through high productivity and efficiency of medical practitioners' works. It also enables quick response to patients' demands and high-quality medical services and, consequently, patients' high satisfaction.

  • PDF

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.

Analysis of influential factors on respiratory symptoms of nail shop workers

  • Kim, Jung-ae;Kim, Su-min
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.24-34
    • /
    • 2017
  • Nail art is a kind of nail painting or decoration that adds to the beauty. Throughout making nail art, the worker was on a dusty operation with the smoothing of chemicals and nails. People working at nail shops not only use a variety of chemicals, but also experience a lot of fine powder during the process of nail trimmings. While drying the chemical adhesive, the workers often complain of eye, nose and throat discomfort. In addition, the acrylic brush is characterized by a lot of smell when washed with washing solution. Also nail art workers directly influence the worker's breathing through the work done by placing the guest's hands in a work space called a nail table. Chemical ingredients used in nail art procedures include acetone, ethyl acetic acid, toluene, butyl acetic acid, glue, and top coating of nail varnishes. Prolonged inhalation of these substances may cause dizziness, vomiting, as well as impaired respiratory system. The purpose of this study is to investigate the respiratory symptoms of nail shop workers who are likely to be affected by work in nail shop and to find out which factors have the greatest influence if they have respiratory symptoms. Therefore this study is to provide basic data on the health management system of people engaged in nail shop and to develop health education program. For this study, the data collection was collected on July 7, 2017 for the nail shop workers attending the nail art trend seminar held in Gwangju, in Korea. The data were all 236. However, except for the poor data, 208 data were used for the final analysis. The questionnaire consisted of 30 in general questions, questions about self-efficacy in 24 questions. elf-efficacy measuring tool developed by A.Y, Kim, I. Y, Park(2001). The self-efficacy questionnaire consists of 24 items and is self-reported 7-point Likert scale. The reliability of this tool was cronbach alpha = .934.The collected data were analyzed using spss 18.0. Information of Research participant performed frequency analysis. To examine the effects of personal characteristics on self-efficacy, $X^2$ analysis was conducted. And also $X^2$ analysis was conducted to analyze the coughing symptom appearance according to individual and environmental factors. A hierarchical regression analysis was used to determine which of the personal and environmental factors influenced cough symptoms.

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

Standardization of Underground Shopping Center Address System for the Three-Dimensional GIS-based Emergency Management (3차원 GIS기반의 소방방재를 위한 지하상가 주소체계 표준화)

  • Ha, Byeong Po;Kang, In Joon;Hong, Soon Heon;Park, Dong Hyun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.63-69
    • /
    • 2014
  • Due to population growth and urban development in construction technology has expanded living space, underground construction as public transport as has been extended to the ground and underground urban traffic congestion increases. This underpass Stations sphere of influence this development was the center of the living space, space-time became a cultural space. However underpass ground space and time and space are enormous difficulties in contrast visibility due to smoke when light levels are low fire occurs, momentary loss of judgment errors due to a sense of orientation, rapid diffusion and ambient oxygen deficiency due to acquisition limitations, such as the Open resulting in property damage and personal injury. The purpose of this study is to analyze the existing system with respect to the address of the underground shopping center and system for presenting an address to the underground shopping mall in the basement of the straight and circular in connection with the street name address. Also can be known only to evacuate their citizens to address the position in the event of a fire inside the basement through the underground shopping mall address standardization system, the fire department only address exact location is being judged will be identified.

New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox (모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순)

  • Cheon, Eunyoung;Park, Yong-Tae
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-56
    • /
    • 2017
  • As Internet usage is becoming more common worldwide and smartphone become necessity in daily life, technologies and applications related to mobile Internet are developing rapidly. The results of the Internet usage patterns of consumers around the world imply that there are many potential new business opportunities for mobile Internet technologies and applications. The location-based service (LBS) is a service based on the location information of the mobile device. LBS has recently gotten much attention among many mobile applications and various LBSs are rapidly developing in numerous categories. However, even with the development of LBS related technologies and services, there is still a lack of empirical research on the intention to use LBS. The application of previous researches is limited because they focused on the effect of one particular factor and had not shown the direct relationship on the intention to use LBS. Therefore, this study presents a research model of factors that affect the intention to use and actual use of LBS whose market is expected to grow rapidly, and tested it by conducting a questionnaire survey of 330 users. The results of data analysis showed that service customization, service quality, and personal innovativeness have a positive effect on the intention to use LBS and the intention to use LBS has a positive effect on the actual use of LBS. These results implies that LBS providers can enhance the user's intention to use LBS by offering service customization through the provision of various LBSs based on users' needs, improving information service qualities such as accuracy, timeliness, sensitivity, and reliability, and encouraging personal innovativeness. However, privacy concerns in the context of LBS are not significantly affected by service customization and personal innovativeness and privacy concerns do not significantly affect the intention to use LBS. In fact, the information related to users' location collected by LBS is less sensitive when compared with the information that is used to perform financial transactions. Therefore, such outcomes on privacy concern are revealed. In addition, the advantages of using LBS are more important than the sensitivity of privacy protection to the users who use LBS than to the users who use information systems such as electronic commerce that involves financial transactions. Therefore, LBS are recommended to be treated differently from other information systems. This study is significant in the theoretical point of contribution that it proposed factors affecting the intention to use LBS in a multi-faceted perspective, proved the proposed research model empirically, brought new insights on LBS, and broadens understanding of the intention to use and actual use of LBS. Also, the empirical results of the customization of LBS affecting the user's intention to use the LBS suggest that the provision of customized LBS services based on the usage data analysis through utilizing technologies such as artificial intelligence can enhance the user's intention to use. In a practical point of view, the results of this study are expected to help LBS providers to develop a competitive strategy for responding to LBS users effectively and lead to the LBS market grows. We expect that there will be differences in using LBSs depending on some factors such as types of LBS, whether it is free of charge or not, privacy policies related to LBS, the levels of reliability related application and technology, the frequency of use, etc. Therefore, if we can make comparative studies with those factors, it will contribute to the development of the research areas of LBS. We hope this study can inspire many researchers and initiate many great researches in LBS fields.

A Study on the Development Methodology of Intelligent Medical Devices Utilizing KANO-QFD Model (지능형 메디컬 기기 개발을 위한 KANO-QFD 모델 제안: AI 기반 탈모관리 기기 중심으로)

  • Kim, Yechan;Choi, Kwangeun;Chung, Doohee
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.217-242
    • /
    • 2022
  • With the launch of Artificial Intelligence(AI)-based intelligent products on the market, innovative changes are taking place not only in business but also in consumers' daily lives. Intelligent products have the potential to realize technology differentiation and increase market competitiveness through advanced functions of artificial intelligence. However, there is no new product development methodology that can sufficiently reflect the characteristics of artificial intelligence for the purpose of developing intelligent products with high market acceptance. This study proposes a KANO-QFD integrated model as a methodology for intelligent product development. As a specific example of the empirical analysis, the types of consumer requirements for hair loss prediction and treatment device were classified, and the relative importance and priority of engineering characteristics were derived to suggest the direction of intelligent medical product development. As a result of a survey of 130 consumers, accurate prediction of future hair loss progress, future hair loss and improved future after treatment realized and viewed on a smartphone, sophisticated design, and treatment using laser and LED combined light energy were realized as attractive quality factors among the KANO categories. As a result of the analysis based on House of Quality of QFD, learning data for hair loss diagnosis and prediction, micro camera resolution for scalp scan, hair loss type classification model, customized personal account management, and hair loss progress diagnosis model were derived. This study is significant in that it presented directions for the development of artificial intelligence-based intelligent medical product that were not previously preceded.