• Title/Summary/Keyword: Personnel Computer

Search Result 227, Processing Time 0.02 seconds

Analysis and Examination of Trends in Research on Medical Learning Support Tools: Focus on Problem-based Learning (PBL) and Medical Simulations

  • Yea, Sang-Jun;Jang, Hyun-Chul;Kim, An-Na;Kim, Sang-Kyun;Song, Mi-Young;Han, Chang-Hyun;Kim, Chul
    • The Journal of Korean Medicine
    • /
    • v.33 no.4
    • /
    • pp.60-68
    • /
    • 2012
  • Objectives: By grasping trends in research, technology, and general characteristics of learning support tools, this study was conducted to present a model for research on Korean Medicine (KM) to make use of information technology to support teaching and learning. The purpose is to improve the future clinical competence of medical personnel, which is directly linked to national health. Methods: With papers and patents published up to 2011 as the objects, 438 papers were extracted from "Web of Science" and 313 patents were extracted from the WIPS database (DB). Descriptive analysis and network analysis were conducted on the annual developments, academic journals, and research fields of the papers, patents searched were subjected to quantitative analysis per application year, nation, and technology, and an activity index (AI) was calculated. Results: First, research on medical learning support tools has continued to increase and is active in the fields of computer engineering, education research, and surgery. Second, the largest number of patent applications on medical learning support tools were made in the United States, South Korea, and Japan in this order, and the securement of remediation technology-centered patents, rather than basic/essential patents, seemed possible. Third, when the results of the analysis of research trends were comprehensively analyzed, international research on e-PBL- and medical simulation-centered medical learning support tools was seen to expand continuously to improve the clinical competence of medical personnel, which is directly linked to national health. Conclusions: The KM learning support tool model proposed in the present study is expected to be applicable to computer-based tests at KM schools and to be able to replace certain functions of national KM doctor license examinations once its problem DB, e-PBL, and TKM simulator have been constructed. This learning support tool will undergo a standardization process in the future.

Technology Trends and Performance Evaluation for Unmanned Aircraft System Datalink (무인 항공 시스템 데이터링크 기술 동향 및 성능 분석)

  • Hwang, Hyunsu;Jung, Yongcheol;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.329-335
    • /
    • 2016
  • Unmanned aircraft systems (UAS) are defined as the system whose components include the necessary equipment, network, and personnel to control an unmanned aircraft. In the past, UAS were predominately operated for military operations. However, nowadays, the applications of UAS to commercial area are explosively augmented and UAS are being expected to be integrated in national airspace. Therefore, the need for the standardized datalink systems rapidly and the development of control and non-payload communication (CNPC) system are being processed for integration in national airspace in United States and Europe. In this paper, the technology trends for UAS CNPC datalink are explained and presented the performance evaluation results for CNPC system, which is the modified version of IEEE 802.15.4 ZigBee system.

Iris Image Enhancement for the Recognition of Non-ideal Iris Images

  • Sajjad, Mazhar;Ahn, Chang-Won;Jung, Jin-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1904-1926
    • /
    • 2016
  • Iris recognition for biometric personnel identification has gained much interest owing to the increasing concern with security today. The image quality plays a major role in the performance of iris recognition systems. When capturing an iris image under uncontrolled conditions and dealing with non-cooperative people, the chance of getting non-ideal images is very high owing to poor focus, off-angle, noise, motion blur, occlusion of eyelashes and eyelids, and wearing glasses. In order to improve the accuracy of iris recognition while dealing with non-ideal iris images, we propose a novel algorithm that improves the quality of degraded iris images. First, the iris image is localized properly to obtain accurate iris boundary detection, and then the iris image is normalized to obtain a fixed size. Second, the valid region (iris region) is extracted from the segmented iris image to obtain only the iris region. Third, to get a well-distributed texture image, bilinear interpolation is used on the segmented valid iris gray image. Using contrast-limited adaptive histogram equalization (CLAHE) enhances the low contrast of the resulting interpolated image. The results of CLAHE are further improved by stretching the maximum and minimum values to 0-255 by using histogram-stretching technique. The gray texture information is extracted by 1D Gabor filters while the Hamming distance technique is chosen as a metric for recognition. The NICE-II training dataset taken from UBRIS.v2 was used for the experiment. Results of the proposed method outperformed other methods in terms of equal error rate (EER).

A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S. (미국 사이버보안 인력 양성 법·규정 분석을 통한 국내 법·규정 개선 방안 연구)

  • Hong, Soonjwa;Kim, Joonsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.123-139
    • /
    • 2020
  • In 1987, Computer Security Act was enacted, requiring computer security awareness and practical training for federal workforce. This is the beginning of US development of federal cybersecurity workforce. It has been strengthening the development of federal cybersecurity workforce policy by establishing OPM regulations and OMB circulation in cases where it is difficult to define by law. Through GISRA 2000 and FISMA 2002, which has been improved, it played a central role for development of federal cybersecurity workforce for more than 10 years. Since then, FISMA 2014 has been enacted as a necessity for supplementing technology and policy. In 2014, the importance of cyber security personnel in US federal agencies has been increased even more, by enacting a single law on cybersecurity workforce twice. We will review the current state of Korea's development of cybersecurity workforce by reviewing and analyzing the development and federal cybersecurity workforce in the United States.

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

Cryptanalysis and Improvement of RSA-based Authentication Scheme for Telecare Medical Information Systems

  • Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.93-103
    • /
    • 2020
  • The telecare medical information system (TMIS) supports convenient and rapid health-care services. A secure and efficient authentication and key agreement scheme for TMIS provides safeguarding electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Giri et al. proposed an RSA-based remote user authentication scheme using smart cards for TMIS and claimed that their scheme could resist various malicious attacks. In this paper, we point out that their scheme is still vulnerable to lost smart card attacks and replay attacks and propose an improved scheme to prevent the shortcomings. As compared with the previous authentication schemes for TMIS, the proposed scheme is more secure and practical.

Real-Time Fraud Detection using Data Quality Diagnosis Techniques for R&D Grant (데이터 품질진단 기법을 이용한 연구개발비 이상거래 실시간 탐지)

  • Jang, Ki-Man;kim, Chang-Su;Jung, Hoe-kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2609-2614
    • /
    • 2015
  • National research and development projects institutions have implemented various measures in order to prevent R&D expenses abuse and negate enforcement. but it reveals a limit to prevent abuse of R&D expenses[1,2]. In this paper, to prevent abuses resulting from the R & D for the unusual trading post caught collecting information from the R & D phase implementation plan to detect unusual transactions. The results are subjective and research institutions, and specialized agencies to take advantage of shared, real-time cross-linkage between the credit card companies. Studies of data quality diagnostic techniques developed for this purpose related regulations and manuals, Q & A, FAQ, Outside-in business rules that derive from a variety of information, such as personnel interviews (Outside-In) was used for analysis.

Automated detection of corrosion in used nuclear fuel dry storage canisters using residual neural networks

  • Papamarkou, Theodore;Guy, Hayley;Kroencke, Bryce;Miller, Jordan;Robinette, Preston;Schultz, Daniel;Hinkle, Jacob;Pullum, Laura;Schuman, Catherine;Renshaw, Jeremy;Chatzidakis, Stylianos
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.657-665
    • /
    • 2021
  • Nondestructive evaluation methods play an important role in ensuring component integrity and safety in many industries. Operator fatigue can play a critical role in the reliability of such methods. This is important for inspecting high value assets or assets with a high consequence of failure, such as aerospace and nuclear components. Recent advances in convolution neural networks can support and automate these inspection efforts. This paper proposes using residual neural networks (ResNets) for real-time detection of corrosion, including iron oxide discoloration, pitting and stress corrosion cracking, in dry storage stainless steel canisters housing used nuclear fuel. The proposed approach crops nuclear canister images into smaller tiles, trains a ResNet on these tiles, and classifies images as corroded or intact using the per-image count of tiles predicted as corroded by the ResNet. The results demonstrate that such a deep learning approach allows to detect the locus of corrosion via smaller tiles, and at the same time to infer with high accuracy whether an image comes from a corroded canister. Thereby, the proposed approach holds promise to automate and speed up nuclear fuel canister inspections, to minimize inspection costs, and to partially replace human-conducted onsite inspections, thus reducing radiation doses to personnel.

Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction

  • Shrestha, Deepanjal;Wenan, Tan;Gaudel, Bijay;Rajkarnikar, Neesha;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.480-502
    • /
    • 2022
  • This work assesses the degree of satisfaction tourists receive as final recipients in a tourism destination based on the fact that satisfied tourists can make a significant contribution to the growth and continuous improvement of a tourism business. The work considers Pokhara, the tourism capital of Nepal as a prefecture of study. A stratified sampling methodology with open-ended survey questions is used as a primary source of data for a sample size of 1019 for both international and domestic tourists. The data collected through a survey is processed using a data mining tool to perform multi-dimensional analysis to discover information patterns and visualize clusters. Further, supervised machine learning algorithms, kNN, Decision tree, Support vector machine, Random forest, Neural network, Naive Bayes, and Gradient boost are used to develop models for training and prediction purposes for the survey data. To find the best model for prediction purposes, different performance matrices are used to evaluate a model for performance, accuracy, and robustness. The best model is used in constructing a learning-enabled model for predicting tourists as satisfied, neutral, and unsatisfied visitors. This work is very important for tourism business personnel, government agencies, and tourism stakeholders to find information on tourist satisfaction and factors that influence it. Though this work was carried out for Pokhara city of Nepal, the study is equally relevant to any other tourism destination of similar nature.

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.