• Title/Summary/Keyword: Security Treatment

Search Result 284, Processing Time 0.026 seconds

A Study on Smart Medical Treatment System and Security (스마트 진료시스템과 보안에 관한 연구)

  • Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.107-113
    • /
    • 2012
  • Due to the development of communications technology, it is now possible to be offered online from remote places. This kind of communications technology can be applied to the medical field. The medical treatment appointments in hospitals can be its typical example. But still, in most of hospitals, patient or guardian have to physically visit or call to the hospital to set up an appointment for the medical treatment. In addition, they have to wait in line in order to pay after receiving the medical treatment. The patient or guardian, after paying, receive a paper prescription and they go to a nearby pharmacy to take the medicines. They must wait in line again there in order to receive the medicine from the pharmacy. In this paper, we would like to suggest a smart medical treatment system in order to solve the problems discussed above. With this proposed system, the user will be able to make an appointment, make payments and receive medication quickly and easily without spending extra time. Also, there will be no need for paper prescriptions with this system. We discuss about the security of medical information for this proposed smart medical treatment system proposed.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

Cost Optimization in SIS Model of Worm Infection

  • Kim, Jong-Hyun;Radhakrishnan, Sridhar;Jang, Jong-Soo
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.692-695
    • /
    • 2006
  • Recently, there has been a constant barrage of worms over the Internet. Besides threatening network security, these worms create an enormous economic burden in terms of loss of productivity not only for the victim hosts, but also for other hosts, as these worms create unnecessary network traffic. Further, measures taken to filter these worms at the router level incur additional network delays because of the extra burden placed on the routers. To develop appropriate tools for thwarting the quick spread of worms, researchers are trying to understand the behavior of worm propagation with the aid of epidemiological models. In this study, we present an optimization model that takes into account infection and treatment costs. Using this model we can determine the level of treatment to be applied for a given rate of infection spread.

  • PDF

IoMT Technology and Medical Information Security (IoMT 기술과 의료정보 보안)

  • Woo, SungHee;Lee, Hyojeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.641-643
    • /
    • 2021
  • The Internet of Things (IoT) connects all markets and industries, enabling new business models for a variety of services and service providers. The Internet of Medical Things (IoMT) not only accelerates medical advances, but also enables treatment with a more human approach. In addition, it improves treatment methods and quality of precision medical care through data, enables timely treatment, and improves operational productivity of medical institutions through a simplified workflow. However, since the medical field directly affects human health and life, securing security has become an issue above all else, and is a target for hackers trying to exploit it. Therefore, in this study, IoMT technology and security threats and countermeasures in the medical field are analyzed.

  • PDF

A Study on Airport Security Performance Improvement based on Risk Management Concept (위험관리 개념에 근거한 항공보안업무 합리화 방안 연구)

  • Hwang, Kyung-Chul;Yoo, Kwang-Eui
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.2
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

A Study on the Utilizing Certificate Awareness for Student Certificate Holders of Private Security Guard (신변보호사 자격취득 학생들의 자격활용 인식에 관한 연구)

  • Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.45-54
    • /
    • 2013
  • Korea Security Association suggested from who Professor An, Hwang Kwon advocated the introduction of a private security guard certification system, and the private security guard certification exam has been conducted seven times since 2005, being authorized by the government. Currently, there are a lot of certified private security guards who have passed the exam. In fact, however, no preference is given to them. In terms of employment, they don't receive any preferential treatment nor are given any extra points. Furthermore, they cannot afford to make use of their certificate. The purpose of this study was to examine the state of utilizing the private security guard certificate among student certificate holders and their awareness of the private security guard system. The findings of the study were as follows: First, it's important to present a vision for certified private security guards, and what equally matters is to make it clear how and where they can show what they can do. Second, it's required to improve the image and reliability of private security guards as professional security guards. Third, candidates for the certification exam should boost their own self-esteem, confidence and professionalism as competent human resources who can make a contribution to society.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Transfer Learning Using Convolutional Neural Network Architectures for Glioma Classification from MRI Images

  • Kulkarni, Sunita M.;Sundari, G.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.198-204
    • /
    • 2021
  • Glioma is one of the common types of brain tumors starting in the brain's glial cell. These tumors are classified into low-grade or high-grade tumors. Physicians analyze the stages of brain tumors and suggest treatment to the patient. The status of the tumor has an importance in the treatment. Nowadays, computerized systems are used to analyze and classify brain tumors. The accurate grading of the tumor makes sense in the treatment of brain tumors. This paper aims to develop a classification of low-grade glioma and high-grade glioma using a deep learning algorithm. This system utilizes four transfer learning algorithms, i.e., AlexNet, GoogLeNet, ResNet18, and ResNet50, for classification purposes. Among these algorithms, ResNet18 shows the highest classification accuracy of 97.19%.

An Automated Way to Detect Tumor in Liver

  • Meenu Sharma. Rafat Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.209-213
    • /
    • 2023
  • In recent years, the image processing mechanisms are used widely in several medical areas for improving earlier detection and treatment stages, in which the time factor is very important to discover the disease in the patient as possible as fast, especially in various cancer tumors such as the liver cancer. Liver cancer has been attracting the attention of medical and sciatic communities in the latest years because of its high prevalence allied with the difficult treatment. Statistics indicate that liver cancer, throughout world, is the one that attacks the greatest number of people. Over the time, study of MR images related to cancer detection in the liver or abdominal area has been difficult. Early detection of liver cancer is very important for successful treatment. There are few methods available to detect cancerous cells. In this paper, an automatic approach that integrates the intensity-based segmentation and k-means clustering approach for detection of cancer region in MRI scan images of liver.

A Study on the Improvement of Concentration and Memory Based on Eye Tracking Game for the Treatment of ADHD (ADHD 치료를 위한 아이트래킹 게임 기반 집중력과 기억력 향상 연구)

  • Eun-Sun Choi;Da-vin Choi;Na-ra Yun;Da-Yeon Yoo;Jisu Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1016-1017
    • /
    • 2023
  • 이 연구는 ADHD 환자를 대상으로 디지털 치료 게임을 개발하였으며, 환자의 주의력과 기억력을 향상시키도록 구성되었다. 게임은 눈 움직임과 ADHD 의 연관성을 고려하여 아이트래킹 기술을 활용하여 개발되었다. 이를 통해 ADHD 환자를 위한 맞춤형 디지털 치료 게임의 중요성을 강조한다.