• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.032 seconds

A Study on the Hospital Information System in Korea (우리나라 병원정보시스템 실태에 관한 연구)

  • 전기홍;조우현
    • Health Policy and Management
    • /
    • v.4 no.2
    • /
    • pp.1-26
    • /
    • 1994
  • As the hospital environment is changing rapidly, management is therefore obligated to use new ways to provide better service to patients. For example information system is introduced to some hospitals in Korea. Information system has several benefits such a soperational efficiency by on-line delivery and processing of data, accurate and rapid information production, continuous monitoring of performance and feedback, improvement of work process and better service quality. Still, many hospitals cannot be sure that information system is useful for improving organization performance. Because only one or two area of hospital information system were considered for development and with limited development hospital information system cannot be used effectively. The purpose of this study is to suggest the model of information system utilizaton and to analyze the hospital in formation system in Korea. The results are following; 1. In Korea, proportion of operating system of comuter is 31% of UNIX, 11% of IBM OS and 10% of PC LAN. 2. As we expect, scope of application software and amounts of heardware and software invest ments are affected by concern of CEO. 3. Many CIO(chief information officer) say that the biggest problems are lack of after-service and obsolescence of computer equipments in terms of hardware and shortage of application software for hospital in terms of software. 4. Personnel of information system department is so small that hospital information system can't be improved. 5. During the development of information system, full-time participation of end user is only 20% hospital with almost less than 12 person-month. This study was accomplished by survey through mail questionnaires. Response to the survey was only 55% and it was hard to generalize all the result obtained from this survey. However, We hope that this study would be helpful for helth care organization to acknowlege hospital information system in korea and to design the future architecture and frame of information system.

  • PDF

Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development

  • Porawat Visutsak;Xiabi Liu;Keun Ho Ryu;Naphat Bussabong;Nicha Sirikong;Preeyaphorn Intamong;Warakorn Sonnui;Siriwan Boonkerd;Jirawat Thongpiem;Maythar Poonpanit;Akarasate Homwiseswongsa;Kittipot Hirunwannapong;Chaimongkol Suksomsong;Rittikait Budrit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.126-146
    • /
    • 2024
  • Caladium bicolor is one of the most popular plants in Thailand. The original species of Caladium bicolor was found a hundred years ago. Until now, there are more than 500 species through multiplication. The classification of Caladium bicolor can be done by using its color and shape. This study aims to develop a model to classify Caladium bicolor using a transfer learning technique. This work also presents a proof of concept, GUI design, and web application deployment using the user-design-center method. We also evaluated the performance of the following pre-trained models in this work, and the results are as follow: 87.29% for AlexNet, 90.68% for GoogleNet, 93.59% for XceptionNet, 93.22% for MobileNetV2, 89.83% for RestNet18, 88.98% for RestNet50, 97.46% for RestNet101, and 94.92% for InceptionResNetV2. This work was implemented using MATLAB R2023a.

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

Research for the satisfaction of social network service - Functional elements of Instagram and Facebook - (소셜 네트워크 서비스의 만족도를 위한 연구 - 인스타그램과 페이스북의 기능적 요소를 중심으로 -)

  • Choi, Seula-A;Hong, Mi-Hee
    • Cartoon and Animation Studies
    • /
    • s.40
    • /
    • pp.423-442
    • /
    • 2015
  • In a digital environment that is keep in change content from smart phones to tablet PC are a social network service is holding deep place in our lives. Social networking applications has building a network and communication with others than other application, it means that Social networking applications are sharing not only personal purpose in that trend of variety and competition of these social networks can be expected to trend and be developed thru analysis of user certification. this study of social network service application is proposed to developing of application thru analyze the two-effective application which is high ranked in google store. the theoretical foundation was set based on the seven elements of the social network service of the information structures designed by Jean Smith. This study proceeded analysis is for the functional elements of Facebook and Instagram, and the advantages and disadvantages through survey research. As a result of the empirical analysis to user of Instagram and face book of communication, identity, satisfaction for the group are equally. Instagram is about the presence, reputation, and Facebook has had a high level of satisfaction for each sharing and relationship. Facebook got high satisfaction from sharing features, but user feel of discomfort in the randomly showing advertising content. Instagram is not showing off advertise on common page of content, it is good point to be complementary to facebook. And, Instagram hashtag is good for convenience, but satisfaction is high with Facebook. in order to increase the satisfaction of Instagram, it is necessary to consider the main advantage of the communication and the functional aspects of the share from facebook.

A Dynamic Management Method for FOAF Using RSS and OLAP cube (RSS와 OLAP 큐브를 이용한 FOAF의 동적 관리 기법)

  • Sohn, Jong-Soo;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.39-60
    • /
    • 2011
  • Since the introduction of web 2.0 technology, social network service has been recognized as the foundation of an important future information technology. The advent of web 2.0 has led to the change of content creators. In the existing web, content creators are service providers, whereas they have changed into service users in the recent web. Users share experiences with other users improving contents quality, thereby it has increased the importance of social network. As a result, diverse forms of social network service have been emerged from relations and experiences of users. Social network is a network to construct and express social relations among people who share interests and activities. Today's social network service has not merely confined itself to showing user interactions, but it has also developed into a level in which content generation and evaluation are interacting with each other. As the volume of contents generated from social network service and the number of connections between users have drastically increased, the social network extraction method becomes more complicated. Consequently the following problems for the social network extraction arise. First problem lies in insufficiency of representational power of object in the social network. Second problem is incapability of expressional power in the diverse connections among users. Third problem is the difficulty of creating dynamic change in the social network due to change in user interests. And lastly, lack of method capable of integrating and processing data efficiently in the heterogeneous distributed computing environment. The first and last problems can be solved by using FOAF, a tool for describing ontology-based user profiles for construction of social network. However, solving second and third problems require a novel technology to reflect dynamic change of user interests and relations. In this paper, we propose a novel method to overcome the above problems of existing social network extraction method by applying FOAF (a tool for describing user profiles) and RSS (a literary web work publishing mechanism) to OLAP system in order to dynamically innovate and manage FOAF. We employed data interoperability which is an important characteristic of FOAF in this paper. Next we used RSS to reflect such changes as time flow and user interests. RSS, a tool for literary web work, provides standard vocabulary for distribution at web sites and contents in the form of RDF/XML. In this paper, we collect personal information and relations of users by utilizing FOAF. We also collect user contents by utilizing RSS. Finally, collected data is inserted into the database by star schema. The system we proposed in this paper generates OLAP cube using data in the database. 'Dynamic FOAF Management Algorithm' processes generated OLAP cube. Dynamic FOAF Management Algorithm consists of two functions: one is find_id_interest() and the other is find_relation (). Find_id_interest() is used to extract user interests during the input period, and find-relation() extracts users matching user interests. Finally, the proposed system reconstructs FOAF by reflecting extracted relationships and interests of users. For the justification of the suggested idea, we showed the implemented result together with its analysis. We used C# language and MS-SQL database, and input FOAF and RSS as data collected from livejournal.com. The implemented result shows that foaf : interest of users has reached an average of 19 percent increase for four weeks. In proportion to the increased foaf : interest change, the number of foaf : knows of users has grown an average of 9 percent for four weeks. As we use FOAF and RSS as basic data which have a wide support in web 2.0 and social network service, we have a definite advantage in utilizing user data distributed in the diverse web sites and services regardless of language and types of computer. By using suggested method in this paper, we can provide better services coping with the rapid change of user interests with the automatic application of FOAF.

Spyware detection system related to wiretapping based on android power consumption and network traffics (안드로이드 소비 전력 및 네트워크 트래픽을 기반으로 한 도청 관련 스파이웨어 탐지 시스템)

  • Park, Bum-joon;Lee, Ook;Cho, Sung-phil;Choi, Jung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.829-838
    • /
    • 2015
  • As the number of smartphone users have increased, many kinds of malwares have emerged. Unlike existing malwares, spyware can be installed normally after user authentication and agreement according to security policy. For this reason, it is not easy to catch spywares involving harmful functionalities to users by using existing malware detection system. Therefore, our paper focuses on study about detecting mainly wiretapping spywares among them by developing a new wiretapping detection model and application. Specifically, this study conducts to find out power consumption on each application and modular and network consumption to detect voice wiretapping so Open Source Project Power Tutor is used to do this. The risk assessment of wiretapping is measured by gathered all power consumption data from Open Source Project Power Tutor. In addition, developed application in our study can detect at-risk wiretapping spyware through collecting and analyzing data. After we install the application to the smartphone, we collect needed data and measure it.

Coarse grained Simulation Model for Web Application Performance Analysis (웹 애플리케이션 성능 분석을 위한 대략적 시뮬레이션 모델)

  • Kim, Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.25-31
    • /
    • 2008
  • The web has been evolving as an indispensable part of our lives since Berners Lee introduced the first web sever and browser in 1990. From the web end user's point of view, the response time is a matter of concern. Moreover the throughput is an important factor to consider for the system manager's point as well. It's not easy to estimate the performance of a web application because it depends on various elements comprising the whole operational environment of the Internet from networking, client and server computing powers, DBMS and OS capabilities, to application itself. This paper suggests a coarse grained simulation model for web application performance estimation based on the data measured by Buch and Pentkowski [1] and the analytical model proposed by Gunther [2]. The result of the simulation model almost coincides with the measured data and estimates the performance of a new environment.

  • PDF

Middleware on Hanuri/C as a Multimedia Client-Server Application Development Tool (멀티미디어 클라이언트-서버 응용 개발 도구인 한우리/C의 미들웨어)

  • Im, Chae-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.797-806
    • /
    • 1995
  • The Client-Server model is a computing technique that efficiently uses distributed resources via networks. But, generating an application using Client- Server model requires many different expertises to developers in comparison to that of using the centralized computing method. That is, and application developer must be familiar with network programming and GUI(Graphical User Interface) techniques in addition to conventional programming skills. Accordingly, the time and man power have been issued for building a Client-Server system. To alleviate these problem, the Client-Server applications development tools are needed To meet such a need, we developed a GUI based tool, called Hanuri/C, for generating Client-Server application programs. In comparison to existing Client-Server tools, Hanuri/C is reinforced Multimedia facilities, Hanuri/C is reinforced Multimedia facilities. Hanuri/C is considered as a front-end part of distributed system software. That is, Hanuri/C is a Client-Server tool similar to Forth Generation Language(4GL) supporting multimedia application on top of the Distributed Computing environment(DCE). In this paper, we present the design and implementation method of the middleware part of Hanuri/c.

  • PDF

The Effect of Community Mapping Application Development and Application on the Safety Consciousness of Elementary and Middle Schools (커뮤니티맵핑 어플리케이션 개발과 활용이 초·중생의 안전의식 고취에 끼치는 영향)

  • Kwon, Jin-Suk;Lee, Hyo-Jeong;Shin, Eun-Hye;Park, So-Soon
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.323-338
    • /
    • 2019
  • Purpose: The purpose of this study is to propose an educational program for enhance safety capability of elementary and middle school students through community mapping application. Method: Developed and utilized a community mapping application that can be easily used for research. After participating in 425 elementary and middle school students, This study analyzed the change of safety competency through survey. Results: Through the community mapping activities, it was possible to derive the actual life surrounding risk factors of the earthy life, and it was found through the questionnaire before and after the activity that the safety competence of the participants improved. Conclusion: Investigation of similar related cases of Public Participant Safety Mapping Tool and analysis of their functionalities are conducted, and user demanded functionalities with improved usability accessability expandability are derived. Also, the system applied the test to elementary and middle school students and the survey showed that the safety capacity was improved according to Safety Mapping activities. This is proposed as a safety education program.

A Developer Support Tool for Efficient Testing of IoT Applications (IoT 애플리케이션의 효율적인 테스팅을 위한 개발자 지원 도구)

  • Lee, Euihyeok;Kim, Dongwoo;Kang, Seungwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1216-1227
    • /
    • 2019
  • We propose TITAN (Tool for IoT ApplicatioN testing), a developer support tool that enables efficient testing of IoT applications. TITAN is designed to allow IoT application developers to run their applications under the development environment without being restricted by physical environments and users' behaviors required to test application logic being developed. Using TITAN, IoT application developers can save the time and effort needed to repeatedly perform the testing of application logic while they develop their applications. In this paper, we present the system architecture of TITAN and its current prototype implementation. We evaluate the usefulness and usability of TITAN through a small user study with two example IoT applications. The study participants show their positive perception about the usefulness of TITAN. We further discuss the limitations of the current study and future research directions.