• Title/Summary/Keyword: database access

Search Result 877, Processing Time 0.025 seconds

An Improvement of Hospital Reception System using Web Socket (웹소켓을 이용한 병원 접수시스템 개선에 관한 연구)

  • Son, Man-Geun;Park, Ki-Seong;Kong, Yong-Hae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.185-195
    • /
    • 2015
  • During hospital peak times of outpatients, an effective mechanism that informs the newly receipted patient information to corresponding medical departments is lacking in current hospital reception systems. Since every department repeatedly searches entire patient reception database in sequential manner to acquire its reception information, this is a significant performance degradation factor in hospital information system. To improve hospital reception system efficiency, we developed two web socket based systems, a primary key transmitting batch system and a reception information transmitting real time system. The former reduced database access time compared to sequential search system as well as kept search time low regardless of receipted patient number. The latter effectively reduced waiting list updating time in request/response patient reception system by eliminating database access.

Directions for Developing Database Schema of Records in Archives Management Systems (영구기록물관리를 위한 기록물 데이터베이스 스키마 개발 방향)

  • Yim, Jin-Hee;Lee, Dae-Wook;Kim, Eun-Sil;Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.34
    • /
    • pp.57-105
    • /
    • 2012
  • The CAMS(Central Archives Management System) of NAK(National Archives of Korea) is an important system which receives and manages large amount of electronic records annually from 2015. From the point of view in database design, this paper analyzes the database schema of CAMS and discusses the direction of overall improvement of the CAMS. Firstly this research analyzes the tables for records and folders in the CAMS database which are core tables for the electronic records management. As a result, researchers notice that it is difficult to trust the quality of the records in the CAMS, because two core tables are entirely not normalized and have many columns whose roles are unknown. Secondly, this study suggests directions of normalization for the tables for records and folders in the CAMS database like followings: First, redistributing the columns into proper tables to reduce the duplication. Second, separating the columns about the classification scheme into separate tables. Third, separating the columns about the records types and sorts into separate tables. Lastly, separating metadata information related to the acquisition, takeover and preservation into separate tables. Thirdly, this paper suggests considerations to design and manage the database schema in each phase of archival management. In the ingest phase, the system should be able to process large amount of records as batch jobs in time annually. In the preservation phase, the system should be able to keep the management histories in the CAMS as audit trails including the reclassification, revaluation, and preservation activities related to the records. In the access phase, the descriptive metadata sets for the access should be selected and confirmed in various ways. Lastly, this research also shows the prototype of conceptual database schema for the CAMS which fulfills the metadata standards for records.

Current treatment status and medical costs for hemodialysis vascular access based on analysis of the Korean Health Insurance Database

  • Lee, Hyung Seok;Ju, Young-Su;Song, Young Rim;Kim, Jwa Kyung;Choi, Sun Ryoung;Joo, Narae;Kim, Hyung Jik;Park, Pyoungju;Kim, Sung Gyun
    • The Korean journal of internal medicine
    • /
    • v.33 no.6
    • /
    • pp.1160-1168
    • /
    • 2018
  • Background/Aims: The Republic of Korea is a country where the hemodialysis population is growing rapidly. It is believed that the numbers of treatments related to vascular access-related complications are also increasing. This study investigated the current status of treatment and medical expenses for vascular access in Korean patients on hemodialysis. Methods: This was a descriptive observational study. We inspected the insurance claims of patients with chronic kidney disease who underwent hemodialysis between January 2008 and December 2016. We calculated descriptive statistics of the frequencies and medical expenses of procedures for vascular access. Results: The national medical expenses for access-related treatment were 7.12 billion KRW (equivalent to 6.36 million USD) in 2008, and these expenses increased to 42.12 billion KRW (equivalent to 37.67 million USD) in 2016. The population of hemodialysis patients, the annual frequency of access-related procedures, and the total medical cost for access-related procedures increased by 1.6-, 2.6-, and 5.9-fold, respectively, over the past 9 years. The frequency and costs of access care increased as the number of patients on hemodialysis increased. The increase in vascular access-related costs has largely been driven by increased numbers of percutaneous angioplasty. Conclusions: The increasing proportion of medical costs for percutaneous angioplasty represents a challenge in the management of end-stage renal disease in Korea. It is essential to identify the clinical and physiological aspects as well as anatomical abnormalities before planning angioplasty. A timely surgical correction could be a viable option to control the rapid growth of access-related medical expenses.

An MIB Access Control Modeling for the Secure Management of Large Networks (대규모 망의 안전한 관리를 위한 관리 정보베이스의 접근 제어 모형화)

  • Seo, Jae-Hyeon;Lee, Chang-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.581-591
    • /
    • 1995
  • An MIB is the heart of a network management system and it stores all information that is necessary for network management. To operate networks safely, it is essential to control accesses to managed objects. This paper provides three-level architecture of managers so as to perform network management more efficiently in large networks. Moreover, mandatory access control(MAC) policy and role-based access control policy are adopted to ensure the secure access to the MIB. These policies are modeled by using the active object-oriented data model, which makes easy to map these access control models into the active object-oriented database.

  • PDF

A Study on the Service Features for Next Generation Open Access Journals (오픈액세스 학술지의 차세대 서비스 모형에 관한 연구)

  • Choi, Sang-Hee;Choi, Seon-Heui
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.89-107
    • /
    • 2010
  • Open access journal has been one of the major academic information sources for researcherscharacterizing itself as free resource. Recently, as competition among academic information service provides becomes intense, open access journal also needs to enhance its service and expand information service function. This study aims to propose service features for next generation service of open access journals by analyzing service features of leading journal database services. As a result, four service features are suggested such as journal article components and multimedia features, expanded searching features, social service features and mobile information service.

Issues of IPR Database Construction through Interdisciplinary Research (학제간 연구를 통한 IPR 데이터베이스 구축의 쟁점)

  • Kim, Dong Yong;Park, Young Chul
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.59-69
    • /
    • 2017
  • Humanities and social sciences researchers and database experts have teamed up to build a database of IPR materials prepared by the Institute of Pacific Relations (IPR). This paper presents the issues and solutions inherent in the database construction for ensuring the quality of IPR materials. For the accessibility of the database, we maintain the database on the Web so that researchers can access it via web browsers; for the convenience of the database construction, we provide an integrated interface that allows researchers to perform all tasks in it; for the completeness of IPR materials constructed, we support the responsible input and the responsible approval that identify responsibilities of each IPR material entered; and for the immediacy of the approval, we support an interactive approval process facilitating the input of researchers. We also use database design, query processing, transaction management, and search and sorting techniques to ensure the correctness of IPR materials entered. In particular, through concurrency control using existence dependency relationships between records, we ensure the correctness between the operating system files and their paths. Our future studies include content search, database download and upload, and copyright related work on IPR materials.

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.

A Study of Efficient Access Method based upon the Spatial Locality of Multi-Dimensional Data

  • Yoon, Seong-young;Joo, In-hak;Choy, Yoon-chul
    • Proceedings of the Korea Database Society Conference
    • /
    • 1997.10a
    • /
    • pp.472-482
    • /
    • 1997
  • Multi-dimensional data play a crucial role in various fields, as like computer graphics, geographical information system, and multimedia applications. Indexing method fur multi-dimensional data Is a very Important factor in overall system performance. What is proposed in this paper is a new dynamic access method for spatial objects called HL-CIF(Hierarchically Layered Caltech Intermediate Form) tree which requires small amount of storage space and facilitates efficient query processing. HL-CIF tree is a combination of hierarchical management of spatial objects and CIF tree in which spatial objects and sub-regions are associated with representative points. HL-CIF tree adopts "centroid" of spatial objects as the representative point. By reflecting objects′sizes and positions in its structure, HL-CIF tree guarantees the high spatial locality of objects grouped in a sub-region rendering query processing more efficient.

  • PDF

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

Certificates Binding Method Using OCSP Server (OCSP 서버를 이용한 인증서 결합방안)

  • Kim JiHong;Chi JunWoong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.1
    • /
    • pp.45-52
    • /
    • 2004
  • With the development of Information Communication Technique, electronic commerce is widely used in Internet using public key certificates. And the study on access control for web server or database server is also progressed actively. In this paper, we analyze the proposed access control method for server and the binding method between public key certificates and attribute certificates using OCSP server.