• Title/Summary/Keyword: file service

Search Result 465, Processing Time 0.027 seconds

Implementation of MINI-PACS using the DICOM Converter on the Web (DICOM Converter를 이용한 웹상에서의 MINI-PACS 구현)

  • Ji, Youn-Sang
    • Journal of radiological science and technology
    • /
    • v.23 no.1
    • /
    • pp.103-111
    • /
    • 2000
  • In recent years, medical procedures have become more complex, while financial pressures for shortened hospital stays and increased efficiency in patient care have increased. As a result, several shortcomings of present film-based systems for managing medical images have become apparent. Maintaining film space is labor intensive and consumes valuable space. Because only single copies of radiological examinations exist, they are prone to being lost or misplaced, thereby consuming additional valuable time and expense. In this paper, MINI-PACS for image archiving, transmission, and viewing offers a solution to these problems. Proposed MINI-PACS consists of mainly four parts such as Web Module, Client-Server Module, Internal Module, Acquisition Module. In addition, MINI-PACS system includes DICOM Converter that Non-DICOM file format converts standard file format. In Client-Server Module case, Proposed system is combined both SCU(Service Class User: Client) part and SCP(Service Class Provider: Server)part therefore this system provides the high resolution image processing techniques based on windows platform. Because general PACS system is too expensive for Medium and Small hospitals to install and operate the full-PACS. Also, we constructed Web Module for database connection through the WWW.

  • PDF

A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages (공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구)

  • Kim, Jong Min;Chun, Hui Young;Choi, Eun A
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

Torus Network Based Distributed Storage System for Massive Multimedia Contents (토러스 연결망 기반의 대용량 멀티미디어용 분산 스토리지 시스템)

  • Kim, Cheiyol;Kim, Dongoh;Kim, Hongyeon;Kim, Youngkyun;Seo, Daewha
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1487-1497
    • /
    • 2016
  • Explosively growing service of digital multimedia data increases the need for highly scalable low-cost storage. This paper proposes the new storage architecture based on torus network which does not need network switch and erasure coding for efficient storage usage for high scalability and efficient disk utilization. The proposed model has to compensate for the disadvantage of long network latency and network processing overhead of torus network. The proposed storage model was compared to two most popular distributed file system, GlusterFS and Ceph distributed file systems through a prototype implementation. The performance of prototype system shows outstanding results than erasure coding policy of two file systems and mostly even better results than replication policy of them.

A Study on Multimedia Application Service using DTV Closed Caption Data (디지털방송 자막데이터를 이용한 멀티미디어 응용 서비스 연구)

  • Kim, Jung-Youn;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.14 no.4
    • /
    • pp.488-500
    • /
    • 2009
  • In this paper, we study on making a use of value-added services using DTV closed caption data. Note that Closed-Captioning service helps to bridge "digital divide" through extending broadcasting accessibility of a neglected class such as hearing-impaired person and foreigner. In Korea, DTV Closed Captioning standard was developed in June 2007, and Closed Captioning service should be provided by an enforcing law in all broadcasting services in April 2008. Here, we describe the method of extracting a caption data from MPEG-2 Transport Stream of ATSC-based digital TV signal and generating a caption file using the extracted caption data and time information. In addition, we present the segmentation method of broadcasting content using caption file. Experimental results show that implemented S/W tool provides the feasibility of the proposed methods and the usability of closed caption for a variety of data application service.

Spatial Data Service Based on RIA for Mobile Environment (모바일 환경을 위한 RIA 기반 공간 데이터 서비스)

  • Lee, Jae-Il;Kim, Ji-Ho;Oh, Byoung-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.56-64
    • /
    • 2009
  • As the Internet has been improved to Web 2.0, it introduces new approaches including Rich Internet Application (RIA) technology such as Flash, AJAX, Silverlight, etc. The RIA which is platform independent technology allows applications to provide rich client-side interfaces, and allows the browser to interact with users without communication to server. In this paper, we propose a method of spatial data service based on RIA technology. Internet map service using spatial data generally requires rich client-side interfaces and various interactions. These features can be provided by the RIA. The proposed method uses Flash developed by Macromedia as RIA technology. It can be applicable on any platform including mobile environment. The spatial data server makes Flash file known as SWF (Shock Wave File) with manipulation code for map and spatial data that is requested by user, and send it to the web browser. Once the web browser receives a SWF, client SWF manipulates user interactions, such as zooming and panning, without communication with server. Experiments that execute the application on various web browsers including mobile web browser and measure time of map interaction are carried out to compare with traditional bitmap based WMS (Web Map Service). As a result of experiments, we have confirmed improvement of interactivity and performance with RIA approach.

  • PDF

A Development of GVP for Hierarchical POI Information Visualization based on GML (GML 기반 계층적 POI 정보 가시화를 위한 GVP 개발)

  • Song, Eun-Ha;Park, Yong-Jin;Jeong, Young-Sik
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.541-548
    • /
    • 2008
  • Today, GIS service requires not only a simple map visualization but also geographical information of each object. However, POI service provides simply geographical naming service only because of lacking in geographical information of objects. In addition, geographical space data representation functioning that is the basis for most GIS has not been standardized yet. In this paper, it is designed that POI DB that is hierarchical and user-oriented and it is constructed that GVP(GML Viewer POI) that is the basis of GML specification to overcome difference and incompatibility of map visualization. GVP adds POI DB in a 3-Layer structure to dBase file managing the information of SHP file attributes. Therefore, POI visualization enables hierarchical search, by providing POI information in directory-type grouping. Consisting of map visualization and POI visualization, GVP regenerates attributes in the form of individual objects and responds to user events immediately.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

A Study on the Factors of Dissatisfaction and Complaint in Foodservice Consumers (외식소비자 불만족의 요인 및 불평 행동에 관한 연구)

  • Jin, Yang-Ho;Jun, Jin-Hwa
    • Culinary science and hospitality research
    • /
    • v.11 no.2
    • /
    • pp.14-31
    • /
    • 2005
  • The findings of the study would be valuable for the basis of marketing strategies to be implemented in the foodservice industry. As a result of the exploratory factor analysis, major consumer dissatisfaction factors identified in this study can be categorized based on the followings: food, service, and facilities. It appears that most preferred medium for unsatisfied consumers to file their employees how to cope with complaints on the Internet. In terms of psychological compensation, it appears that consumers need to be provided with a through explanation in addition to a heartfelt apology against a complaint. On the physical side of compensation solution for everybody. The ideal timing of compensation for complaints can vary but it would be appropriate to leave it up to consumers to choose when they want to be rewarded.

  • PDF