• Title/Summary/Keyword: file name

Search Result 88, Processing Time 0.023 seconds

Design of the Web based Mini-PACS (웹(Web)을 기반으로 한 Mini-PACS의 설계)

  • 안종철;신현진;안면환;박복환;김성규;안현수
    • Progress in Medical Physics
    • /
    • v.14 no.1
    • /
    • pp.43-50
    • /
    • 2003
  • PACS mostly has been used in large scaled hospital due to expensive initial cost to set up the system. The network of PACS is independent of the others: network. The user's PC has to be connected physically to the network of PACS as well as the image viewer has to be installed. The web based mini-PACS can store, manage and search inexpensively a large quantity of radiologic image acquired in a hospital. The certificated user can search and diagnose the radiologic image using web browser anywhere Internet connected. The implemented Image viewer is a viewer to diagnose the radiologic image. Which support the DICOM standard and was implemented to use JAVA programming technology. The JAVA program language is cross-platform which makes easier upgrade the system than others. The image filter was added to the viewer so as to diagnose the radiologic image in detail. In order to access to the database, the user activates his web browser to specify the URL of the web based PACS. Thus, The invoked PERL script generates an HTML file, which displays a query form with two fields: Patient name and Patient ID. The user fills out the form and submits his request via the PERL script that enters the search into the relational database to determine the patient who is corresponding to the input criteria. The user selects a patient and obtains a display list of the patient's personal study and images.

  • PDF

A Study of Metadata for Long-Term Preservation of Digital Research Outcome (디지털 연구성과물의 장기보존을 위한 메타데이터에 관한 연구)

  • Jang, Bo-Seong;Nam, Young-Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.4
    • /
    • pp.281-309
    • /
    • 2011
  • This research designed and proposed metadata elements for the long-term preservation of digital research outcomes collected and managed in electronic file form. Metadata structure of both domestic and foreign agencies that manage research outcomes and CERIF and PREMIS-preserved preservation metadata were referred to design the metadata elements. The metadata design was divided into research information, bibliographic information and archival information. Research information is divided into project, name and institution, and composed of eight top-level elements and 29 sub-level elements. Bibliographic information is composed of 13 top-level elements as the source of research reports. Archival information is composed of 18 top-level elements and 62 sub-level elements as the elements for context, structure, contents and management process of the electronic records.

A Proactive Inference Method of Suspicious Domains (선제 대응을 위한 의심 도메인 추론 방안)

  • Kang, Byeongho;YANG, JISU;So, Jaehyun;Kim, Czang Yeob
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.405-413
    • /
    • 2016
  • In this paper, we propose a proactive inference method of finding suspicious domains. Our method detects potential malicious domains from the seed domain information extracted from the TLD Zone files and WHOIS information. The inference process follows the three steps: searching the candidate domains, machine learning, and generating a suspicious domain pool. In the first step, we search the TLD Zone files and build a candidate domain set which has the same name server information with the seed domain. The next step clusters the candidate domains by the similarity of the WHOIS information. The final step in the inference process finds the seed domain's cluster, and make the cluster as a suspicious domain set. In experiments, we used .COM and .NET TLD Zone files, and tested 10 seed domains selected by our analysts. The experimental results show that our proposed method finds 55 suspicious domains and 52 true positives. F1 scores 0.91, and precision is 0.95 We hope our proposal will contribute to the further proactive malicious domain blacklisting research.

Implementation of Intelligent Medical Image Retrieval System HIPS (지능형 의료영상검색시스템 HIPS 구현)

  • Kim, Jong-Min;Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.15-20
    • /
    • 2016
  • This paper describes the construction of knowledge data retrieval management system based on medical image CT. The developed system is aimed to improve the efficiency of the hospital by reading the medical images using the intelligent retrieval technology and diagnosing the patient 's disease name. In this study, the medical image DICOM file of PACS is read, the image is processed, and feature values are extracted and stored in the database. We have implemented a system that retrieves similarity by comparing new CT images required for medical treatment with the feature values of other CTs stored in the database. After converting 100 CT dicom provided for academic research into JPEG files, Code Book Library was constructed using SIFT, CS-LBP and K-Mean Clustering algorithms. Through the database optimization, the similarity of the new CT image to the existing data is searched and the result is confirmed, so that it can be utilized for the diagnosis and diagnosis of the patient.

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

Development of Automatic Data Transmitting System of Atrial Blood Gas Results via LAN (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • Kim, Nam-Hyun;Huh, Jae-Man;Kim, Ji-Hyue;Kim, Do-Nyun;Kim, Won-Ky;Chang, Byung-Chul
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.11
    • /
    • pp.103-104
    • /
    • 1992
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system to automatically transmit the data from the atrial blood gas analyzer. In this system, HOST computer, FILE server, LAN(Local Area Network), 3270 Emulator and Multi-port card were integrated. Also, 3 blood gas analyser(NOVA Inc., USA) were connected to a single multi-port card which is attached in a personal computer for data acquisition. When specimen is collected from sampling sites, it is transfered to the lab. After analysis, the result is transmitted to the personal computer via serial communication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Sex, etc.) is obtained from the HOST computer througth the emulator. The combined data(patient information & lab data) is transmitted to the each request site via LAN automatically. From the collected data, patient's previous data could be reviewed, and it could be used for the various statistics and the flow chart for clinical research. Also, we found that this system reduces the personal labor.

  • PDF

Development of an Inexpensive Black Box with Transmission of SOS and Theft Signal for an Agricultural Tractor (도난방지 및 구조신호 전송기능이 있는 저가형 농용트랙터 블랙박스 개발)

  • Kim, YuYong;Shin, Seung-Yeoub;Kim, Byounggap;Kim, Hyung Kweon;Cho, Yongho;Kim, Jinoh
    • Journal of Biosystems Engineering
    • /
    • v.37 no.6
    • /
    • pp.352-358
    • /
    • 2012
  • Purpose: The inexpensive black box system was developed to acquire and save driving information, to give the slope information, and to transmit SOS and theft signal. Method: The device consists of a main micro controller to acquire and save data, a GPS sensor module, a CDMA module, a touch LCD module, a RF (Radio Frequency) ID module, a SD (Secure Digital) card module, an emergency electric power source, a theftproof circuit, and a sensing device. The sensing device consists of a 8 bit micro controller, a accelerometer to detect impulse, two slope sensors to detect roll and pitch angle and a circuit to detect operation of 6 lighting devices. Results: Test results are as follows: 1) a tractor can be start up only with an electronic key (password or RFID card), 2) theft signal was transmitted when a tractor moved without an electronic key, 3) SOS was transmitted at conditions that rollover or crash happened. 4) 5 more than per 1s data are recorded at 5 minute intervals as new file name in SD card. Conclusions: This system can be used to save travelling record, reduce accident, prevent theft and rescue life in the accidents.

A GPU-enabled Face Detection System in the Hadoop Platform Considering Big Data for Images (이미지 빅데이터를 고려한 하둡 플랫폼 환경에서 GPU 기반의 얼굴 검출 시스템)

  • Bae, Yuseok;Park, Jongyoul
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.20-25
    • /
    • 2016
  • With the advent of the era of digital big data, the Hadoop platform has become widely used in various fields. However, the Hadoop MapReduce framework suffers from problems related to the increase of the name node's main memory and map tasks for the processing of large number of small files. In addition, a method for running C++-based tasks in the MapReduce framework is required in order to conjugate GPUs supporting hardware-based data parallelism in the MapReduce framework. Therefore, in this paper, we present a face detection system that generates a sequence file for images to process big data for images in the Hadoop platform. The system also deals with tasks for GPU-based face detection in the MapReduce framework using Hadoop Pipes. We demonstrate a performance increase of around 6.8-fold as compared to a single CPU process.

Metadata Analysis of Open Government Data by Formal Concept Analysis (형식 개념 분석을 통한 공공데이터의 메타데이터 분석)

  • Kim, Haklae
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.305-313
    • /
    • 2018
  • Public open data is a database or electronic file produced by a public agency or government. The government is opening public data through the open data portals and individual agency websites. However, it is a reality that there is a limit to search and utilize desired public data from the perspective of data users. In particular, it takes a great deal of effort and time to understand the characteristics of data sets and to combine different data sets. This study suggests the possibility of interlinking between data sets by analyzing the common relationship of item names held by public data. The data sets are collected from the open data portal, and item names included in the data sets are extracted. The extracted item names consist of formal context and formal concept through formal concept analysis. The format concept has a list of data sets and a set of item name as extent and intent, respectively, and analyzes the common items of intent end to determine the possibility of data connection. The results derived from the formal concept analysis can be effectively applied to the semantic connection of the public data, and can be applied to data standard and quality improvement for public data release.

Design and Implementation of Efficient Dynamic Update and Zone Transfer in the Secure DNS (안전한 DNS에서의 효율적인 동적 갱신과 존 전송 기능의 설계와 구현)

  • Shim, Hee-Won;Shim, Young-Chul;Im, Chan-Soon;Lee, Man-Hee;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.99-114
    • /
    • 2000
  • In the secure DNS the amount of information that should be managed greatly increased and the interdependency in the information became very complex. Therefore, it became necessary to develop a mechanism which can manage zone information efficiently. Moreover, a consistent interface became also necessary so that a secure DNS may be efficiently interconnected with other Internet application services. In this paper we explain the design and implementation of a secure DNS extended with two functions : (1) a dynamic update function which enables to add and remove zone information dynamically and (2) a zone transfer function that efficiently transfers update zone information among DNS servers. We developed a method which integrates two zone transfer mechanisms, full zone transfer and incremental zone transfer, and also proposed a method to compress data in the zone transfer message. We also introduced a data structure called a delta file to integrate the zone transfer function and the dynamic update function.

  • PDF