15 research outputs found

    ์ƒ์„ฑ์  ์ ๋Œ€ ์‹ ๊ฒฝ๋ง์„ ํ™œ์šฉํ•œ ์•…์˜์ ์ธ ๊ณต๊ฒฉ์— ๊ฐ•์ธํ•œ ๋„คํŠธ์›Œํฌ ํ›ˆ๋ จ ๋ฐฉ๋ฒ•

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2020. 8. ์ด์ •์šฐ.์ตœ๊ทผ์˜ ๋”ฅ ๋Ÿฌ๋‹ ๊ธฐ์ˆ ์˜ ๋†€๋ผ์šด ๋ฐœ์ „์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋„คํŠธ์›Œํฌ ์‹ ๊ฒฝ๋ง์€ ์—ฌ์ „ํžˆ ์•…์˜์ ์ธ ๊ณต๊ฒฉ์— ์ทจ์•ฝํ•˜๋‹ค. ์•…์˜์ ์ธ ์ด๋ฏธ์ง€๋ฅผ ํ›ˆ๋ จ ๋ฐ์ดํ„ฐ๋กœ ์‚ฌ์šฉํ•˜์—ฌ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋งŽ์€ ์ ๋Œ€์  ํ›ˆ๋ จ ๋ฐฉ๋ฒ•์ด ๋„์ž…๋˜์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ด๋Ÿฌํ•œ ๊ธฐ์ˆ ์— ์‚ฌ์šฉ๋˜๋Š” ์•…์˜์ ์ธ ์ด๋ฏธ์ง€๋ฅผ ์ƒ์„ฑํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ํ•ญ์ƒ ๊ณ ์ •๋˜์–ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์—, ๋„คํŠธ์›Œํฌ ์‹ ๊ฒฝ๋ง์€ ์ด๋Ÿฌํ•œ ๊ณต๊ฒฉ์— ๋Œ€ํ•ด์„œ๋งŒ ๋ชจ๋ธ์„ ๋” ๊ฐ•์ธํ•˜๊ฒŒ ๋งŒ๋“œ๋Š” ๊ณผ์ ํ•ฉ ํ•™์Šต์„ ์ˆ˜ํ–‰ํ•˜๊ฒŒ ๋œ๋‹ค. ์ด ๋…ผ๋ฌธ์˜ ์ฒซ๋ฒˆ์งธ ํŒŒํŠธ์—์„œ๋Š” ์ƒ์„ฑ์  ์ ๋Œ€ ์‹ ๊ฒฝ๋ง์„ ํ™œ์šฉํ•œ ์ƒˆ๋กœ์šด ๋ฐฉ์‹์˜ ์ ๋Œ€์  ํ›ˆ๋ จ ๋ฐฉ๋ฒ•์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ์ œ์•ˆํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋ถ„๋ฅ˜๊ธฐ ๋„คํŠธ์›Œํฌ ์ด์™ธ์— ์ถ”๊ฐ€์ ์œผ๋กœ ๋ถ„๋ฅ˜๊ธฐ์˜ ์•ฝ์ ์„ ์ฐพ์•„์„œ ๊ฐ€์žฅ ํšจ๊ณผ์ ์ธ ์„ญ๋™์„ ์ƒ์„ฑํ•˜๋Š” ๋˜ ํ•˜๋‚˜์˜ ์‹ ๊ฒฝ๋ง์„ ์ถ”๊ฐ€ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด ์ƒ์„ฑ๊ธฐ ๋„คํŠธ์›Œํฌ๋Š” ๋ถ„๋ฅ˜๊ธฐ์˜ ์†์‹ค์„ ์ตœ๋Œ€ํ™”ํ•˜๋Š” ์„ญ๋™์„ ์ƒ์„ฑํ•˜๋„๋ก ํ›ˆ๋ จ๋˜๋ฉฐ, ๋ถ„๋ฅ˜๊ธฐ ๋„คํŠธ์›Œํฌ๋Š” ์ƒ์„ฑ๊ธฐ ๋„คํŠธ์›Œํฌ๋กœ๋ถ€ํ„ฐ ์ƒ์„ฑ๋œ ์•…์˜์ ์ธ ์ด๋ฏธ์ง€๋ฅผ ์‹ค์ œ ๋ ˆ์ด๋ธ”๋กœ ๋ถ„๋ฅ˜ํ•˜๋„๋ก ํ›ˆ๋ จ๋œ๋‹ค. ์ฆ‰, ๋‘ ๋„คํŠธ์›Œํฌ๋Š” ์„œ๋กœ ๊ฒฝ์Ÿํ•˜๋ฉฐ ์ตœ๋Œ€-์ตœ์†Œํ™” ๊ฒŒ์ž„ (minimax game)์„ ์ˆ˜ํ–‰ํ•˜๊ฒŒ ๋œ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ๋‚˜๋ฆฌ์˜ค์—์„œ ์ƒ์„ฑ๊ธฐ ๋„คํŠธ์›Œํฌ๋Š” ๋ถ„๋ฅ˜๊ธฐ ๋„คํŠธ์›Œํฌ์˜ ์•ฝ์ ์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ฐพ์•„์„œ ์„ญ๋™์„ ์ƒ์„ฑํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์œ„์—์„œ ์„ค๋ช…ํ•œ ๊ณผ์ ํ•ฉ ๋ฌธ์ œ๋ฅผ ์™„ํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค. ์šฐ๋ฆฌ๋Š” ์ด๋ก ์ ์œผ๋กœ ์œ„ ์ตœ์ ํ™” ๋ฌธ์ œ๊ฐ€ ๊ฒฐ๊ตญ ์ ๋Œ€์  ์†์‹ค (adversarial loss)๋ฅผ ์ตœ์†Œํ™”ํ•˜๋Š” ๊ฒƒ๊ณผ ๊ฐ™๋‹ค๋Š” ๊ฒƒ์„ ์ฆ๋ช…ํ•˜์˜€๋‹ค. ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ ์„ธํŠธ๋ฅผ ์‚ฌ์šฉํ•œ ์‹คํ—˜ ๊ฒฐ๊ณผ ์šฐ๋ฆฌ์˜ ๋ฐฉ๋ฒ•์ด ๊ธฐ์กด์˜ ์ ๋Œ€์  ํ›ˆ๋ จ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋ณด๋‹ค ์šฐ์ˆ˜ํ•œ ๊ฒƒ์œผ๋กœ ๋ฐํ˜€์กŒ๋‹ค. ์ด ๋…ผ๋ฌธ์˜ ๋‘ ๋ฒˆ์งธ ํŒŒํŠธ์—์„œ๋Š” ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง ๊ธฐ๋ฐ˜์˜ ์ƒˆ๋กœ์šด ํ˜‘์—… ํ•„ํ„ฐ๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์‹œํ•œ๋‹ค. ํ˜‘์—… ํ•„ํ„ฐ๋ง ๊ธฐ์ˆ ์€ ๊ธฐ์กด๊นŒ์ง€๋Š” ํ–‰๋ ฌ ๋ถ„ํ•ด, ์ตœ๊ทผ์ ‘ ์ด์›ƒ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋“ฑ ์ „ํ†ต์ ์ธ ๊ธฐ๊ณ„ ํ•™์Šต ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์‚ฌ์šฉ๋œ ๋ฐ˜๋ฉด, ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง์„ ๋ณธ๊ฒฉ์ ์œผ๋กœ ํ™œ์šฉํ•˜์˜€๋‹ค. ์ •๊ทœํ™” ๋œ ์‚ฌ์šฉ์ž ํ‰๊ฐ€ ๋ฒกํ„ฐ์™€ ์‚ฌ์šฉ์ž ์•„์ดํ…œ ๋ฒกํ„ฐ๊ฐ€ ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง์˜ ์ž…๋ ฅ์œผ๋กœ ์‚ฌ์šฉ๋˜์—ˆ๊ณ , ์‹คํ—˜ ๊ฒฐ๊ณผ๋Š” ์ œ์•ˆํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ์ „ํ†ต์ ์ธ ํ˜‘์—… ํ•„ํ„ฐ๋ง ๊ธฐ์ˆ ์— ๋น„ํ•˜์—ฌ ๋งค์šฐ ๋›ฐ์–ด๋‚œ ํšจ๊ณผ๊ฐ€ ์žˆ์Œ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋˜ํ•œ, ๊ณ„์‚ฐ ๋ณต์žก๋„๋ฅผ ํš๊ธฐ์ ์œผ๋กœ ์ค„์ด๊ณ , ์„ฑ๋Šฅ์ €ํ•˜๊ฐ€ ๊ฑฐ์˜ ์—†๋Š” ์‹ค์‹œ๊ฐ„ ์˜ˆ์ธก ๋ฐ ํ•™์Šต์ด ๊ฐ€๋Šฅํ•˜๋‹ค๋Š” ์žฅ์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ œ์•ˆํ•˜๋Š” ํ˜‘์—… ํ•„ํ„ฐ๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์ ๋Œ€์ ์ธ ํ›ˆ๋ จ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ†ตํ•˜์—ฌ ๋ณด๋‹ค ์ ๋Œ€์ ์ธ ๋…ธ์ด์ฆˆ์— ๊ฐ•์ธํ•ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ์‹คํ—˜์ ์œผ๋กœ ํ™•์ธํ•˜์˜€๋‹ค. ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋“ค์€ ํ–ฅํ›„ ์ธ๊ณต์ง€๋Šฅ ๊ธฐ์ˆ ์ด ์‚ฐ์—…์— ์‘์šฉ๋จ์— ์žˆ์–ด ๋งค์šฐ ์ค‘์š”ํ•œ ๋ณด์•ˆ ๋ฌธ์ œ๋“ค์„ ํ•ด๊ฒฐํ•ด ์ค„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€๋œ๋‹ค.Despite the remarkable development of recent deep learning techniques, neural networks are still vulnerable to adversarial attacks. Many adversarial training methods were introduced as to solve this problem, using adversarial examples as a training data. However, these adversarial attack methods used in these techniques are fixed, making the model stronger only to attacks used in training, which is widely known as an overfitting problem. In the first part of this dissertation, I suggest a novel adversarial training approach. In addition to the classifier, our method adds another neural network that generates the most effective adversarial perturbation by finding the weakness of the classifier. This perturbation generator network is trained to produce perturbations that maximize the loss function of the classifier, and these adversarial examples train the classifier with a true label. In short, the two networks compete each other, performing a minimax game. In this scenario, attack patterns created by the generator network are adaptively altered to the classifier, mitigating the overfitting problem mentioned above. I theoretically proved that our minimax optimization problem is equivalent to minimizing the adversarial loss after all. I proposed a new evaluation method that can fairly measure the robustness of the network. Experiments with various datasets show that our method outperforms conventional adversarial training algorithms. In the second part of this dissertation, I propose a novel collaborative filtering algorithm based on deep neural networks, whereas existing collaborative filtering techniques use conventional machine learning algorithms such as baseline predictor, matrix factorization, KNN, etc. Normalized user-rating vector and normalized item-rating vector were used as inputs to a neural network. Experimental results show that the proposed method outperforms conventional collaborative filtering algorithms. The proposed method has another strong advantage that online operation is possible with little extra complexity and performance degradation. The results of these studies are expected to solve very important security problems when artificial intelligence technology is applied to the industry in the future.Chapter 1 Introduction ๏ผ‘ 1.1 Overview ๏ผ‘ 1.2 Contributions and Organization ๏ผ– 1.3 Notation ๏ผ‘๏ผ‘ Chapter 2 Adversarial training and Generative Adversarial Networks ๏ผ‘๏ผ“ 2.1 Adversarial Attack Methods ๏ผ‘๏ผ“ 2.1.1 Fast Gradient Method (FGM) ๏ผ‘๏ผ– 2.1.2 Projected Gradient Descent (PGD) ๏ผ‘๏ผ— 2.1.3 Momentum Iterative method (MIM) ๏ผ‘๏ผ™ 2.1.4 JSMA ๏ผ’๏ผ‘ 2.1.5 Deepfool ๏ผ’๏ผ’ 2.1.6 Carlini & Wagner ๏ผ’๏ผ“ 2.2 Adversarial training methods ๏ผ’๏ผ• 2.2.1 Adversarial training with fast gradient method ๏ผ’๏ผ— 2.2.2 Adversarial training with projected gradient descent ๏ผ’๏ผ™ 2.2.3 Ensemble Adversarial Training ๏ผ“๏ผ 2.3 Generative Adversarial Networks ๏ผ“๏ผ’ Chapter 3 Generative Adversarial Trainer with image classification task ๏ผ“๏ผ– 3.1 Adversarial Training with generative adversarial trainer ๏ผ“๏ผ– 3.2 Theoretical background ๏ผ”๏ผ’ 3.3 Evaluation method ๏ผ”๏ผ— 3.4 Experiments ๏ผ•๏ผ“ 3.4.1 Experimental setup ๏ผ•๏ผ“ 3.4.2 Attack performance of the generative adversarial trainer ๏ผ•๏ผ— 3.4.3 Defense performance on various attacks ๏ผ–๏ผ‘ 3.4.4 Varying Hyper-parameters ๏ผ–๏ผ— Chapter 4 Generative Adversarial Trainer with Collaborative Filtering ๏ผ—๏ผ 4.1 Introduction ๏ผ—๏ผ 4.2 Related Work ๏ผ—๏ผ“ 4.3 Problem Formulation ๏ผ—๏ผ— 4.4 Deep Neural Network for Collaborative Filtering ๏ผ—๏ผ™ 4.4.1 The Neural Network Model ๏ผ˜๏ผ 4.4.2 Online Collaborative Filtering ๏ผ˜๏ผ” 4.4.3 Generative Adversarial Trainer with Collaborative Filtering ๏ผ˜๏ผ˜ 4.5 Experiments ๏ผ˜๏ผ™ 4.5.1 Movielens Dataset ๏ผ˜๏ผ™ 4.5.2 Experiment Environments ๏ผ™๏ผ‘ 4.5.3 Prediction Accuracy ๏ผ™๏ผ“ 4.5.4 Online Prediction Accuracy ๏ผ™๏ผ— 4.5.5 Robust Collaborative Filtering ๏ผ‘๏ผ๏ผ Chapter 5 Conclusion ๏ผ‘๏ผ๏ผ’ Bibliography ๏ผ‘๏ผ๏ผ–Docto

    Effects of dietary protein level and yeast cell wall product on immune and stress response of calves

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๋†์ƒ๋ช…๊ณตํ•™๋ถ€, 2011.8. ํ•˜์ข…๊ทœ.Maste

    ้ซ˜้€Ÿ ๋ผ์šฐํ„ฐ๋ฅผ ์œ„ํ•œ ๅคš้‡ ๅ…ฅๅŠ›ๅ‡บๅŠ› ๋ฒ„ํผํ˜• ไบคๆ›ๆฉŸ

    No full text
    Thesis (doctoral)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐ. ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2003.Docto

    (A) study on the building of a hospital information system utilized by a client/server.

    No full text
    ์ „์ž๊ณ„์‚ฐ๊ณผ/์„์‚ฌ[ํ•œ๊ธ€] ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ํด๋ผ์ด์–ธํŠธ/์„œ๋ฒ„๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ณ‘์›์ •๋ณด ์‹œ์Šคํ…œ์˜ ๋Œ€์ƒ์ด ๋˜๋Š” ์—…๋ฌด๋“ค์„ ํฌ๊ฒŒ 4๊ฐ€์ง€๋กœ ์ง„๋ฃŒ๋ถ€๋ฌธ, ์ง„๋ฃŒ์ง€์›๋ถ€๋ฌธ, ์›๋ฌดํ–‰์ •๋ถ€๋ฌธ, ์‚ฌ๋ฌดํ–‰์ •๋ถ€๋ฌธ์œผ๋กœ ๋ถ„๋ฅ˜ํ•˜์˜€์œผ๋ฉฐ, ๊ฐ ๋ถ€๋ฌธ๋ณ„๋กœ ์„ธ๋ถ€์ ์œผ๋กœ ์—…๋ฌด๋ฅผ ๋ถ„์„ํ•˜์˜€๋‹ค. ๊ฐ ๋ถ€๋ฌธ๋ณ„ ์—…๋ฌด๋ฅผ ์ „์‚ฐํ™”ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋„คํŠธ์›, ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค, ์„œ๋ฒ„, ์‹œ์Šคํ…œ์šด์˜์ฒด๊ณ„, ๋„คํŠธ์›์šด์˜์ฒด๊ณ„ ๋“ฑ ๋งŽ์€ ๊ด€๋ จ๋œ ๊ธฐ์ˆ ๋“ค์— ๋Œ€ํ•˜์—ฌ ์ด๋ก ์ ์œผ๋กœ ์ •๋ฆฌํ•˜์˜€๋‹ค. ํŠนํžˆ ํด๋ผ์ด์–ธ ํŠธ/์„œ๋ฒ„ ์‹œ์Šคํ…œ์„ ๊ตฌ์ถ•ํ•˜๋Š”๋ฐ ์žˆ์–ด์„œ์˜ ๊ด€๋ จ๋œ ๊ธฐ๋ฒ•๊ณผ ์‹ ๊ธฐ์ˆ ์— ๊ด€ํ•˜์—ฌ ๊ธฐ์ˆ ํ•˜์˜€์œผ๋ฉฐ, ๋˜ํ•œ ํ˜ธ์ŠคํŠธ ์ค‘์‹ฌ์˜ ์ฒ˜๋ฆฌ๋ฐฉ๋ฒ•์—์„œ ๋‹จ๊ณ„์ ์ธ ํด๋ผ์ด์–ธํŠธ/์„œ๋ฒ„ ์‹œ์Šคํ…œ์œผ๋กœ ์ „์ด๊ณผ์ •์„ ๊ฐ„๋žตํ•˜๊ฒŒ ์„ค๋ช…ํ•˜์˜€๋‹ค. Y๋Œ€ํ•™๋ณ‘์›์˜ ์ „์‚ฐํ™”์˜ ๊ธฐ๋ณธ์›์น™๊ณผ ํƒ€๋ณ‘์›๊ณผ ๋‹ค๋ฅธ ๋…ํŠนํ•œ ๋ณ‘์› ์šด์˜์ œ๋„์˜ ํ™˜๊ฒฝ์— ๋งž๋Š”ํด๋ผ์ด์–ธํŠธ/์„œ๋ฒ„ ๋ฐฉ์‹์„ ์ด์šฉํ•˜์—ฌ ์„ค๊ณ„ํ•˜์˜€์œผ๋ฉฐ, ์ค‘์•™ ์ง‘์ค‘์‹์œผ๋กœ ์ฒ˜๋ฆฌ๋˜์—ˆ๋˜ ๋ชจ๋“  ์—…๋ฌด๋ฅผ ๋ถ„์‚ฐํ•˜์—ฌ ํŠน์ • ์‹œ๊ฐ„๋Œ€์— ์ง‘์ค‘์ ์œผ๋กœ ์ผ์–ด๋‚˜๋Š” Transaction์„ ์—ฌ๋Ÿฌ๋Œ€์˜ ์„œ๋ฒ„์— ๋ถ„์‚ฐ์ฒ˜๋ฆฌ ํ•จ์œผ๋กœ์„œ ์‹ ์†ํ•œ ์—…๋ฌด์ฒ˜๋ฆฌ๋ฅผ ๊ฐ€์ ธ์˜ฌ ์ˆ˜ ์žˆ์—ˆ๊ณ  ํ™˜์ž๋“ค์— ๋Œ€ํ•œ ์ง„๋ฃŒ์„œ๋น„์Šค๋„ ํ•œ ์ฐจ์›๋†’์ผ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋ชจ๋“  ํ”„๋กœ๊ทธ๋žจ์€ ์‚ฌ์šฉ์ž์˜ ํŽธ์˜์„ฑ์„ ์ตœ์šฐ์„ ์œผ๋กœ ๊ณ ๋ คํ•˜์—ฌ ์œˆ๋„์šฐํ™˜๊ฒฝ์œผ๋กœ ๊ตฌ์ถ•ํ•˜์˜€์œผ๋ฉฐ, ๊ฐœ๋ฐœ๋„๊ตฌ๋Š” ๋น„์ฅฌ์–ผ๋ฒ ์ด์ง์œผ๋กœ ๊ฒฐ์ •ํ•˜์˜€๊ณ  ์šด์˜์ ์ธ ์ธก๋ฉด์„ ๊ณ ๋ คํ•˜์—ฌ ํ•œ๊ฐ€์ง€๋กœ ํ†ต์ผํ•˜์˜€๋‹ค. ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋Š” ๊ฐœ์ธ์šฉ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์™€ ํ˜ธํ™˜์ด ์ž˜๋˜๋Š” MS/SQL์„ ์ด์šฉํ•œ ๊ด€๊ณ„ํ˜• ๋ฐ์ดํƒ€๋ฒ ์ด์Šค๋กœ ๊ตฌ์ถ•ํ•˜์˜€์œผ๋ฉฐ ์‹ค ์‚ฌ์šฉ์ž์™€์˜ ์ž๋ฃŒ๊ตํ™˜๋„ ์‰ฝ๊ฒŒ ํ•˜์˜€๋‹ค. ๋ชจ๋“  ์—…๋ฌด๋“ค์ด ์˜คํ”ˆ ์‹œ์Šคํ…œ์œผ๋กœ ๊ตฌ์ถ•๋˜์—ˆ๊ธฐ ๋•Œ๋ฌธ์— ์•ž์œผ๋กœ์˜ ์–ด๋– ํ•œ ํ™˜๊ฒฝ ๋ณ€ํ™”์—๋„ ๋Šฅ๋™์ ์œผ๋กœ ๋Œ€์ฒ˜ํ•  ์ˆ˜ ์žˆ๊ณ , ์ž์ฒด ์ธ๋ ฅ์œผ๋กœ ๊ฐœ๋ฐœํ•˜์˜€๊ธฐ ๋•Œ๋ฌธ์— ์‹œ์Šคํ…œ ์šด์˜์—๋„ ํƒ„๋ ฅ์ ์ด๊ณ , ๋Šฅ๋ฅ ์ ์œผ๋กœ ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค. [์˜๋ฌธ] In this study, utilizing a client/server, all the business which can be the objects of a hospital information system are classified into 4 categories of business; clinic-service business, clinic-support business, hospital-business-administration business, and office- admininstration business. And each category of business was detailedly analysed respectively. In order to computerize each category of buinsess respectively, many technics related to 'network', 'database', 'a system to operate the server system', 'a system to operate the network', etc. were theoreticall refined and put in order. In particular, some technics related to the building of a client/server system and some new technics were also described, and the process for the host-centered data-processing method to change into a step-by-step client/server system was briefly explained in this study. Utilizing the basic principles of the computerization of 'Y' university and a client/server method suitable to the environment of a peculiar system to operate a hospital which differs from those systems for other hospitals, a hospital information system was designed, and with all kinds of business processed concentratively being dispersed, the transactoins concentratively happening in a specific time zone were dispersed and treated in several sets of servers, thereby resulting in rapid management of business as well as heightening the clinic service for patients to a higher level of service. In all the programs to build a hospital information system, the user's convenience was considered as a top priority, which was built in the environment of 'window'; in this, the tool to develop the programs was a 'Visual Basic'. In consideration of the aspect of operation, the programs were consolidated into one kind. The database was built into a relation-type database, utilizing the MS/SQL which is easily interchangeable or portable with personal database; and data exchange with real users was also made easy. Since all kinds of business concerned were built in an open system, this hospital information system can actively cope with any of environmental changes, and since this system was developed by manpower within an organization of a hospital, the system can flexibly and efficiently correspond to its operation.prohibitio

    Influencing factors upon women's self-rated health in the Democratic Republic of the Congo : pregnant women and mother of children under

    No full text
    ๋ณด๊ฑดํ–‰์ •ํ•™๊ณผ/์„์‚ฌ์ฝฉ๊ณ ๋ฏผ์ฃผ๊ณตํ™”๊ตญ์˜ ํ‰๊ท ์ˆ˜๋ช…์€ 2010๋…„ ๊ธฐ์ค€ ๋‚จ์ž 47์„ธ, ์—ฌ์ž 51์„ธ๋กœ ์„ธ๊ณ„ ์ตœ์ €์ˆ˜์ค€์ด๋ฉฐ 5์„ธ ๋ฏธ๋งŒ ์•„๋™์˜ ์‚ฌ๋ง๋ฅ ์ด ์ธ๊ตฌ ์ฒœ ๋ช…๋‹น 540๋ช…(์•„ํ”„๋ฆฌ์นด ํ‰๊ท  480๋ช…, ์„ธ๊ณ„ํ‰๊ท  210๋ช…)์œผ๋กœ ๋ชจ์ž๋ณด๊ฑด๋ถ„์•ผ ์ง€ํ‘œ๊ฐ€ ๋งค์šฐ ์—ด์•…ํ•œ ์‹ค์ •์ด๋‹ค. 21์„ธ๊ธฐ์— ์ง„์ž…ํ•˜๋ฉด์„œ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ๋Š” ์‹ ์ฒด์  ๊ฑด๊ฐ•๊ณผ ์ •์‹ ์  ๊ฑด๊ฐ•์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒƒ์œผ๋กœ ๋ฐํ˜€์ ธ ์„ ์ง„๊ตญ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๊ฐœ๋ฐœ๋„์ƒ๊ตญ๊ฐ€์˜ ๊ตญ๋ฏผ๋“ค์—๊ฒŒ๋„ ์ค‘์š”ํ•œ ์ง€ํ‘œ๊ฐ€ ๋˜์—ˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์€ ์ฝฉ๊ณ ๋ฏผ์ฃผ๊ณตํ™”๊ตญ ์—ฌ์„ฑ๋“ค ์ค‘ ์ž„์‚ฐ๋ถ€์™€ 5์„ธ ๋ฏธ๋งŒ ์•„๋™์˜ ๋ชจ์„ฑ(ๆฏๆ€ง)์„ ์ค‘์‹ฌ์œผ๋กœ ๊ทธ๋“ค์˜ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์š”์ธ์„ ๋ถ„์„ํ•˜์—ฌ, ์ฝฉ๊ณ ๋ฏผ์ฃผ๊ณตํ™”๊ตญ ๋ชจ์„ฑ๋“ค์˜ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ ์ฆ์ง„์— ์œ ํšจํ•œ ํ”„๋กœ๊ทธ๋žจ ๋ฐ ๋ชจ์ž๋ณด๊ฑด ์‚ฌ์—… ๊ฐœ๋ฐœ์„ ์œ„ํ•œ ๊ธฐ์ดˆ์ž๋ฃŒ๋ฅผ ์ œ๊ณตํ•จ์— ์žˆ๋‹ค. ์—ฐ๊ตฌ ๋ชฉ์ ์„ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ฝฉ๊ณ ๋ฏผ์ฃผ๊ณตํ™”๊ตญ ๋‚ด ๋ฐ˜๋‘”๋‘ ์ง€์—ญ 2๊ฐœ ๋ณด๊ฑด์ง€์—ญ(Kenge, Boko)์˜ ์ž„์‚ฐ๋ถ€์™€ 5์„ธ ๋ฏธ๋งŒ ์•„๋™์˜ ๋ชจ์„ฑ 400๋ช…(Kenge-300๋ช…, Boko-100๋ช…)์„ ๋Œ€์ƒ์œผ๋กœ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋ฆฌ๋ผ ์˜ˆ์ƒ๋˜๋Š” ์š”์ธ์„ ์‘๋‹ต์ž์˜ ๊ธฐ๋ณธ์  ํŠน์„ฑ, ๊ฒฝ์ œ์  ์ƒํƒœ, ๋ณด๊ฑด์˜๋ฃŒ ์„œ๋น„์Šค, ์ƒ๋ณ‘ ์–‘์ƒ์œผ๋กœ ๋ถ„๋ฅ˜ํ•˜์—ฌ ์„ค๋ฌธ์กฐ์‚ฌ๋ฅผ ์‹ค์‹œํ•˜์˜€๋‹ค. ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์š”์ธ์„ ํŒŒ์•…ํ•˜๊ธฐ ์œ„ํ•ด ๊ธฐ๋ณธ์  ํŠน์„ฑ(์—ฐ๋ น, ์ข…๊ต, ๊ต์œก์ˆ˜์ค€, ์ฝ์„ ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ, ๊ฐ€๊ตฌ์› ์ˆ˜, ์ž๋…€ ์ˆ˜, ์˜์–‘๊ต์œก ๊ฒฝํ—˜ ์œ ๋ฌด), ๊ฒฝ์ œ์  ์ƒํƒœ(์ง์—…๋ณ„ ๊ฐ€์กฑ์˜ ์ฃผ ์ˆ˜์ž…์›), ๋ณด๊ฑด์˜๋ฃŒ ์„œ๋น„์Šค(์˜๋ฃŒ๋ณดํ—˜ ๊ฐ€์ž…์—ฌ๋ถ€, ๋ณด๊ฑด์‹œ์„ค ์ด์šฉ๊ฒฝํ—˜ ์—ฌ๋ถ€, ๋ณด๊ฑด์„œ๋น„์Šค ์ด์šฉ ์‹œ ๋น„์šฉ ์ง€๋ถˆ์˜์‚ฌ), ์ƒ๋ณ‘ ์–‘์ƒ(์ž„์‹ ์ค‘๋…์ฆ ๊ฒฝํ—˜ ์—ฌ๋ถ€, ์ตœ๊ทผ 1๋…„๊ฐ„ ์•„ํŒ ๋˜ ๊ฒฝํ—˜)์„ ๋…๋ฆฝ๋ณ€์ˆ˜๋กœ ํ•˜์—ฌ ๊ฐ ๋ณ€์ˆ˜๋“ค์„ ์ฐจ๋ก€๋Œ€๋กœ ๊ณ ๋ คํ•œ ์œ„๊ณ„์  ๋กœ์ง€์Šคํ‹ฑ ํšŒ๊ท€๋ถ„์„์„ ์‹ค์‹œํ•˜์˜€๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ์˜์–‘๊ต์œก ๊ฒฝํ—˜์ด ์žˆ๋Š” ์‘๋‹ต์ž, ์‚ฌ๋ฌด์ง์— ์ข…์‚ฌํ•˜๊ณ  ์žˆ๋Š” ์‘๋‹ต์ž, ์˜๋ฃŒ๋ณดํ—˜์— ๊ฐ€์ž…ํ•˜์ง€ ์•Š์€ ์‘๋‹ต์ž, ์ตœ๊ทผ 1๋…„๊ฐ„ ์•„ํŒ ๋˜ ๊ฒฝํ—˜์ด ์—†๋Š” ์‘๋‹ต์ž๊ฐ€ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ๊ฐ€ ์ข‹๋‹ค๊ณ  ์‘๋‹ตํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๊ฒฐ๊ณผ๋Š” ์ฝฉ๊ณ ๋ฏผ์ฃผ๊ณตํ™”๊ตญ์˜ ์ฃผ๊ด€์  ๊ฑด๊ฐ•์ƒํƒœ ๋ฐ ๋ชจ์ž๋ณด๊ฑด ํ–ฅ์ƒ์„ ์œ„ํ•ด์„œ ๋ณด๊ฑด๊ณผ ์˜์–‘๋ถ„์•ผ์˜ ์ง€์  ์žฌ์‚ฐ์„ ๋Š˜๋ฆฌ๊ธฐ ์œ„ํ•œ ๊ต์œก์— ๊ธฐ๋ฐ˜์„ ๋‘” ํ”„๋กœ๊ทธ๋žจ์„ ๊ฐœ๋ฐœํ•˜๊ณ , ํ•ด๋‹น ๊ตญ๊ฐ€์˜ ์‹คํƒœ๋ฅผ ์ •ํ™•ํžˆ ํŒŒ์•…ํ•˜์—ฌ ์ •์ฑ…์„ ๊ฐœ๋ฐœํ•ด์•ผ ํ•˜๋ฉฐ, ์ผ์ƒ์ƒํ™œ์—์„œ์˜ ์งˆ๋ณ‘์ด ์—†๋„๋ก ๊ฑด๊ฐ•์„ ๊ด€๋ฆฌ ํ•  ์ˆ˜ ์žˆ๋Š” ์‹œ์Šคํ…œ์„ ์‚ฌํšŒ ์ „๋ฐ˜์ ์ธ ์ธก๋ฉด์—์„œ ์ •๋ฆฝํ•˜์—ฌ์•ผ ํ•œ๋‹ค๋Š” ์ ์„ ์‹œ์‚ฌํ•œ๋‹ค.ope

    ATM ไบคๆ›ๆฉŸ๋ฅผ ์œ„ํ•œ ์Šค์œ„์นญ ๋„คํŠธ์›Œํฌ ๆง‹้€  ่จญ่จˆ์— ๊ด€ํ•œ ็ก็ฉถ

    No full text
    Thesis (master`s)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐ๊ณตํ•™๋ถ€,1999.Maste
    corecore