• Title/Summary/Keyword: User Environment

Search Result 5,415, Processing Time 0.046 seconds

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

VIDEO GAME CULTURE AND INTERACTIVITY -An exploration of digital interactive media through a metaphorical approach to video game culture-

  • U, Tak
    • 한국게임학회지
    • /
    • v.6 no.1
    • /
    • pp.70-72
    • /
    • 2009
  • This research is focused on defining interaction within the context of digital media and creating a multi cultural definition of interactivity. The concept of multi digital culture and a definition of interaction in digital media have often been overlooked by other researchers and this has caused the emergence of many different notions on this issue. As a result of these varied notions of the concept, public confusion has arisen regarding interactivity. The main purpose of this research is to find a suitable multi definition of interaction through examining local digital culture. In order to analogise multi digital culture, the video game culture is employed as a metaphor to interpret local digital culture. The reason for this is that a specific national culture can be easily identified within the video game culture. Four countries, South Korea, Japan, the U.S. and the UK have been chosen for comparison purposes. Case study, questionnaire and publicly accessible video game related data, such as, video game charts, are used for formalising and analysing unique local digital culture. The Heyri POP UP IMAGE Festival, S. Korea, was also used as a pilot study, with some of the above research methods being employed to analyse South Korean digital culture. In relation to western cases, interview and questionnaire were primarily used. The data from the case countries was carefully compared and analysed and then it became the basis of a theory of multi definition of interaction in digital media. The case study employed the cultural metaphor for this research and in addition video game culture related questionnaires and interviews with experts of interactive art genre, regarding new notions of digital interaction were utilised. The survey was conducted simultaneously in the four different cultural case nations of this research. Twenty respondents from each case nation participated in the survey, in order to investigate firstly, the existence of 'local digital culture' and secondly, the trends and phenomena of 'digital culture' in these four different 'local digital cultural areas'. In terms of interviews with experts of the interactive art genre, these were focused on obtaining their understanding of contemporary digital culture in their research. Using gathered data from the observation of local digital culture, the basic theory of interaction and the terminology of interaction are reformed. Localised definitions of interaction on digital media, control based interaction and communication based interaction are presented, in order to identify a 'locality' in terms of various contemporary digital cultures. As a result of analysing digital culture, new definitions of 'multi definition of digital interaction' were formulated. As mentioned above, 'control' and 'communication' based interaction were initiated, based on 'user to media' relationships. Based on the degree of physical interaction, 'liminal' and 'transitive' interactions were initiated. Less physical digital interaction is named 'liminal' interaction and more physical digital interaction is named' transitive' interaction. These new definitions of interaction were applied to the real world examples of uses of digital interaction, such as, digital interactive installation artworks and video games. The newly defined meaning of digital interaction can be applied to analysing digital interactive installation artworks and possibly indicate their future development and the prospects of future electronic games. Three leading digital interactive artists were selected for this analysis and their works were studied in terms of the implementation of 'multi definition of digital interaction'. Throughout these processes, the meaning of 'communication' in digital interactive media was emphasised. Many of the selected artists' digital installations were focused on 'communication' or 'interaction between each user through digital media', rather than the concept of 'control' in digital interaction, otherwise termed, 'communication with digital media'. In their artworks, interaction between each audience was digitally engaged within the physical interactive environment which was created by the digital media. Both the audience's action and all the reaction throughout the interaction between the audiences, triggered the digital media' s reaction. This audience-audience-media interaction is the key to understanding the concept of 'communication' in physical digital media and it is the main interactive concept upon which the selected digital interactive installation artists for this research and many other artists from similar fields, are concentrating their efforts. In the case of the video game, a similar trend was noticed to that of digital interactive installations. Based on this research's 'multi definition of digital interaction', the video game has evolved from the early stage of being conventional game, which was focused on control based interaction, to the on-line game which was focused on communication based interaction, to physical interactive games, such as, Nintendo Wii, which are focused on more physical interaction and finally, the ubiquitous interactive game, which is mainly concentrated on the concept of 'communication' in physical digital interaction. It is possible that this evolution of the video game concept of interaction is comparable to the progress of digital interactive artworks. This view is based on the fact that both genres show evidence that they are developing in the direction of the concept of 'communication', in terms of physical digital interaction. The important emphasis of this research's results is 'locality' and 'communication' in physical digital interaction. The existence of different digital culture trends, which were assessed by the 'multi definition of digital interaction', can explain the concept of 'locality' in digital interaction. This meaning of 'locality' may assist in understanding contemporary digital culture and can reduce possible misunderstanding as regards 'local' digital culture. In the application of the concept of digital interaction to the field of either artworks or video games, it is possible to form the opinion that an innovative concept of physical digital interaction is 'communication' within this context. This concept and its applications can improve the potential of both digital interactive culture and technology.

  • PDF

Using the METHONTOLOGY Approach to a Graduation Screen Ontology Development: An Experiential Investigation of the METHONTOLOGY Framework

  • Park, Jin-Soo;Sung, Ki-Moon;Moon, Se-Won
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.125-155
    • /
    • 2010
  • Ontologies have been adopted in various business and scientific communities as a key component of the Semantic Web. Despite the increasing importance of ontologies, ontology developers still perceive construction tasks as a challenge. A clearly defined and well-structured methodology can reduce the time required to develop an ontology and increase the probability of success of a project. However, no reliable knowledge-engineering methodology for ontology development currently exists; every methodology has been tailored toward the development of a particular ontology. In this study, we developed a Graduation Screen Ontology (GSO). The graduation screen domain was chosen for the several reasons. First, the graduation screen process is a complicated task requiring a complex reasoning process. Second, GSO may be reused for other universities because the graduation screen process is similar for most universities. Finally, GSO can be built within a given period because the size of the selected domain is reasonable. No standard ontology development methodology exists; thus, one of the existing ontology development methodologies had to be chosen. The most important considerations for selecting the ontology development methodology of GSO included whether it can be applied to a new domain; whether it covers a broader set of development tasks; and whether it gives sufficient explanation of each development task. We evaluated various ontology development methodologies based on the evaluation framework proposed by G$\acute{o}$mez-P$\acute{e}$rez et al. We concluded that METHONTOLOGY was the most applicable to the building of GSO for this study. METHONTOLOGY was derived from the experience of developing Chemical Ontology at the Polytechnic University of Madrid by Fern$\acute{a}$ndez-L$\acute{o}$pez et al. and is regarded as the most mature ontology development methodology. METHONTOLOGY describes a very detailed approach for building an ontology under a centralized development environment at the conceptual level. This methodology consists of three broad processes, with each process containing specific sub-processes: management (scheduling, control, and quality assurance); development (specification, conceptualization, formalization, implementation, and maintenance); and support process (knowledge acquisition, evaluation, documentation, configuration management, and integration). An ontology development language and ontology development tool for GSO construction also had to be selected. We adopted OWL-DL as the ontology development language. OWL was selected because of its computational quality of consistency in checking and classification, which is crucial in developing coherent and useful ontological models for very complex domains. In addition, Protege-OWL was chosen for an ontology development tool because it is supported by METHONTOLOGY and is widely used because of its platform-independent characteristics. Based on the GSO development experience of the researchers, some issues relating to the METHONTOLOGY, OWL-DL, and Prot$\acute{e}$g$\acute{e}$-OWL were identified. We focused on presenting drawbacks of METHONTOLOGY and discussing how each weakness could be addressed. First, METHONTOLOGY insists that domain experts who do not have ontology construction experience can easily build ontologies. However, it is still difficult for these domain experts to develop a sophisticated ontology, especially if they have insufficient background knowledge related to the ontology. Second, METHONTOLOGY does not include a development stage called the "feasibility study." This pre-development stage helps developers ensure not only that a planned ontology is necessary and sufficiently valuable to begin an ontology building project, but also to determine whether the project will be successful. Third, METHONTOLOGY excludes an explanation on the use and integration of existing ontologies. If an additional stage for considering reuse is introduced, developers might share benefits of reuse. Fourth, METHONTOLOGY fails to address the importance of collaboration. This methodology needs to explain the allocation of specific tasks to different developer groups, and how to combine these tasks once specific given jobs are completed. Fifth, METHONTOLOGY fails to suggest the methods and techniques applied in the conceptualization stage sufficiently. Introducing methods of concept extraction from multiple informal sources or methods of identifying relations may enhance the quality of ontologies. Sixth, METHONTOLOGY does not provide an evaluation process to confirm whether WebODE perfectly transforms a conceptual ontology into a formal ontology. It also does not guarantee whether the outcomes of the conceptualization stage are completely reflected in the implementation stage. Seventh, METHONTOLOGY needs to add criteria for user evaluation of the actual use of the constructed ontology under user environments. Eighth, although METHONTOLOGY allows continual knowledge acquisition while working on the ontology development process, consistent updates can be difficult for developers. Ninth, METHONTOLOGY demands that developers complete various documents during the conceptualization stage; thus, it can be considered a heavy methodology. Adopting an agile methodology will result in reinforcing active communication among developers and reducing the burden of documentation completion. Finally, this study concludes with contributions and practical implications. No previous research has addressed issues related to METHONTOLOGY from empirical experiences; this study is an initial attempt. In addition, several lessons learned from the development experience are discussed. This study also affords some insights for ontology methodology researchers who want to design a more advanced ontology development methodology.

A Case Study On Digital Education Design In Foreign Countries By Analysis Education Condition (선진학교 교육현황 분석을 통한 디지털 교육매체 디자인 국외 사례 연구)

  • Kim, Jung-Hee
    • Cartoon and Animation Studies
    • /
    • s.30
    • /
    • pp.201-219
    • /
    • 2013
  • Development of digital media in education field at America, UK, Japan etc bring big progress on digital device if education. Japan bring huge progress on digital education by nationally. UK use huge a national budget at digital education development and Sweden which is advanced country of education and a welfare state. Especially UK and Sweden's digital education markets are full now aspect more high quality design. Korea which is advanced country of IT adopted digital text book 2007 with mathematics, through science and English digital text book through the state. Korea's digital text book is in a transition period. that needs case study of advanced country of education for setting design guide and educational effect to digital education media and device plan. All researches are based on LG europe design center at London. Analysis by using KJ method, survey of questionnaire, heuristic method at 4 schools in UK and Sweden. Through analytical researches want to more reality simulation at digital education, and high quality contents with digital socialization. co-work with analog, can get any where, anytime user want without any difficulty. Also interactive GUI design of digital education device to easy to access for user. When plan Digital text book content and design needs methodical design guide for target who students and environment an in-depth study of the appraisal and method. The results of the research are introduce the design plan as a basic research and giving useful design plan to make digital educational media in Korea industrial aspect.

Usability index evaluation system for mobile WAP service (무선인터넷 서비스 사용성 지수 평가 체계)

  • Park, Hwan-Su
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.152-157
    • /
    • 2008
  • The customer satisfaction of WAP service greatly relies on the usability of the service due to the limited display size of a mobile phone and limitation in realizing UI (User Interface) for function keys, browser, and OS (operating system) Currently, a number of contents providers develop and deliver varying services, and thus, it is critical to control quality level of UI in consistent standards and manner. This study suggests usability index evaluation system to achieve consistent UI quality control of various WAP services. The system adopts both top-down and bottom-up approaches. The former concerns deriving UI design components and evaluation checklists for the WAP, based on the usability attributes and UI principles. The latter concerns deriving usability-related evaluation checklists from the established UI design features, and then grouping them from the viewpoint of usability principles and attributes. This bidirectional approach has two outstanding advantages: it allows thorough examination of potential elements that can cause usability problems from the standpoint of usability attributes, and also derives specific evaluation elements from the perspective of UI design components that are relevant to the real service environment. The evaluation system constitutes a hierarchical structure by networking usability attributes, UI guideline which indicates usability principles for each attribute, and usability evaluation checklist for each UI component that enables specific evaluation. Especially, each evaluation checklist contains concrete contents and format so that it can be readily marked in O/X. The score is based on the ratio of number of items that received positive answer to the number of total items. This enables a quantitative evaluation of the usability of mobile WAP service. The validity of the proposed evaluation system has been proved through comparative analysis with the real usability problems based on the user test. A software was developed that provides guideline for evaluation objects, criteria and examples for each checklist, and automatically calculates a score. The software was applied to evaluating and improving the real mobile WAP service.

  • PDF

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

Relationships between Collective Intelligence Quality, Its Determinants, and Usefulness: A Comparative Study between Wiki Service and Q&A Service in Perspective of Korean Users (집단지성의 품질, 그 결정요인, 유용성의 관계: 수용자 관점에서 한국의 위키서비스와 Q&A 서비스의 비교)

  • Joo, Jaehun;Normatov, Ismatilla R.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.75-99
    • /
    • 2012
  • Innovation can come from inside or outside organizations. Recently, organizations have begun turning to external knowledge more often, through various forms of collective intelligence (CI) as collaborative platform to solve complex problems. Several factors facilitate this CI utilization phenomenon. First, with the rapid development of Internet and social media, numerous web applications have become available to millions of the Internet users over the past few decades. Web 2.0 and social media have become innovative web applications that provide an environment for human social interaction and collaboration. Second, the diffusion of simple and easy-to-use technologies that enable users to interact and design web applications without programming skills have led to vast, previously unknown amounts of user-generated content. Finally, the Internet has enabled communities to connect and collaborate, creating a virtual world of CI. In this study, web enabled CI is defined as a composed ability of individuals who are acting as a single cognitive unit to achieve common goals, think reasonably, solve problems, make decisions, carry out complex tasks, and develop creative ideas collectively through participation and collaboration on the web. Although CI plays a critical role in organizational innovation and collaboration, the dubious quality of CI is still problem that is difficult to solve. In general, the quality level of content collected from the crowd is lower than that from professionals. Thus, it is important to identify determinants of CI quality and to analyze the relationship between CI quality and its usefulness. However, there is a lack of empirical study on the quality factors of web-enabled CI. There exist a variety of web enabled CI sites such as Threadless, iStockphoto or InnoCentive, Wikipedia, and Youtube. One of the most successful forms of web-enabled CI is the Wikipedia online encyclopedia, accessible all over the world. Another one example is Naver KnowledgeiN, a typical and popular CI site offering question and answer (Q&A) services. It is necessary to study whether or not different types of CI have a different effect on CI quality and its usefulness. Thus, the purpose of this paper is to answer to following research questions: ${\bullet}$ What determinants are important to CI quality? ${\bullet}$ What is the relationship between CI quality factors and the usefulness of web-enabled CI? ${\bullet}$ Does CI type have a moderating effect on the relationship between CI quality, its determinants, and CI usefulness? Online survey using Google Docs with email and Kakao Talk was conducted for collecting data from Wikipedia and Naver KnowledgeiN users. A totoal of 490 valid responses were collected, where users of Wikipedia were 220 while users of Naver KnowledgeiN were 270. Expertise of contributors, community size, and diversity of contributors were identified as core determinants of perceived CI quality. Perceived CI quality has significantly influenced perceived CI usefulness from a user's perspective. For improving CI quality, it is believed that organizations should ensure proper crowd size, facilitate CI contributors' diversity and attract as many expert contributors as possible. Hypotheses that CI type plays a role of moderator were partially supported. First, the relationship between expertise of contributors and perceived CI quality was different according to CI type. The expertise of contributors played a more important role in CI quality in the case of Q&A services such as Knowledge iN compared to wiki services such as Wikipedia. This implies that Q&A service requires more expertise and experiences in particular areas rather than the case of Wiki service to improve service quality. Second, the relationship between community size and perceived CI quality was different according to CI type. The community size has a greater effect on CI quality in case of Wiki service than that of Q&A service. The number of contributors in Wikipeda is important because Wiki is an encyclopedia service which is edited and revised repeatedly from many contributors while the answer given in Naver Knowledge iN can not be corrected by others. Finally, CI quality has a greater effect on its usefulness in case of Wiki service rather than Q&A service. In this paper, we suggested implications for practitioners and theorists. Organizations offering services based on collective intelligence try to improve expertise of contributeros, to increase the number of contributors, and to facilitate participation of various contributors.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Establishment of Valve Replacement Registry and Risk Factor Analysis Based on Database Application Program (데이터베이스 프로그램에 기반한 심장판막 치환수술 환자의 레지스트리 확립 및 위험인자 분석)

  • Kim, Kyung-Hwan;Lee, Jae-Ik;Lim, Cheong;Ahn, Hyuk
    • Journal of Chest Surgery
    • /
    • v.35 no.3
    • /
    • pp.209-216
    • /
    • 2002
  • Background: Valvular heart disease is still the most common health problem in Korea. By the end of the year 1999, there has been 94,586 cases of open heart surgery since the first case in 1958. Among them, 36,247 cases were acquired heart diseases and 20,704 of those had valvular heart disease. But there was no database system and every surgeon and physician had great difficulties in analysing and utilizing those tremendous medical resources. Therefore, we developed a valve registry database program and utilize it for risk factor analysis and so on. Material and Method: Personal computer-based multiuser database program was created using Microsoft AccessTM. That consisted of relational database structure with fine-tuned compact field variables and server-client architecture. Simple graphic user interface showed easy-to-use accessability and comprehensibility. User-oriented modular structure enabled easier modification through native AccessTM functions. Infinite application of query function aided users to extract, summarize, analyse and report the study result promptly. Result: About three-thousand cases of valve replacement procedure were performed in our hospital from 1968 to 1999. Total number of prosthesis replaced was 3,700. The numbers of cases for mitral, aortic and tricuspid valve replacement were 1600, 584, 76, respectively. Among them, 700 patients received prosthesis in more than two positions. Bioprosthesis or mechanical prosthesis were used in 1,280 and 1,500 patients respectively Redo valve replacements were performed in 460 patients totally and 40 patients annually Conclusion: Database program for registry of valvular heart disease was successfully developed and used in personal computer-based multiuser environment. This revealed promising results and perspectives in database management and utilization system.