• Title/Summary/Keyword: 보안문제

Search Result 3,066, Processing Time 0.029 seconds

A Study on functional priority of smart home service for single-person household - focusing on Perceived Attributes of Innovations - (1인 가구를 위한 스마트 홈 서비스 기능의 우선순위 연구 - 인지된 혁신 특성 요인을 중심으로 -)

  • Lim, Se Eun;Park, Seung Ho
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2016
  • The purpose of this study is to suggest functional priority to increase probability to be adopted by single-person household by designating single-person household as potential early adopter of smart home service. Smart home service is spread slowly for its value. This study applied diffusion of innovations theory to solve this problem. Single-person household who has no other family member who can take care of household is chosen as potential early adopter. This study tried to find grounds of functional priorities through an online survey. The survey questionnaires were composed as following. First, representative attributes of single- person household were reviewed, then measuring questions according to the attributes were recomposed based upon preceding study. After that, concept and status of smart home service were reviewed. and smart home service functions to be measured in this study were selected through analysis based upon representative cases, then Measuring questionnaire were made were three factors which chosen by referring to preceding study about perceived attributes of innovations applied to selected functions. As a result of analyzed 62 responses, except excluded functions which has perceived any special value, set priorites with 9 functions. These functional priorities obtained from these studies will play a role as fundamental data to provide valuable service to single-person household and have a meaning as a starting point to increase rate of adoption for smart home service.

A Study on the case of Application of Women's Personnel in the Australian Defence Force (호주군 여성인력의 활용과 우리군에 주는 시사점)

  • In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.269-273
    • /
    • 2023
  • After participating in the Second Boer War in 1899, the Australian Army participated in world wars such as World War I, World War II, the Korean War, and the Vietnam War. To overcome the decline in the social recognition of soldiers and the continuous shortage of troops caused by the protracted war, the status and role of female personnel were expanded. The use of female manpower, which started as medical support during the Second Boer War, expanded to combat support missions such as communications, maintenance, driving, secret document management, and radar surveillance during World War II. After the Vietnam War, the Chiefs of Staff of the Australian Army, Navy and Air Force established a committee to expand women's participation in the military, improved service conditions for female personnel and supplemented regulations so that they were treated as soldiers, not women, and reached a turning point in expanding the role of female personnel in the Australian military. As a result, all combat positions, including special forces, were opened to women in 2014, and a plan was established to increase the proportion of women in each service by 2030. As a result, all combat positions, including special forces, were opened to women in 2014, and the Australian Armed Forces set a plan to increase the proportion of women by 2030. Like the Australian military, South Korea is also experiencing a demographic cliff and shortage of troops due to the continuing low birthrate problem. Through the history and current state of the use of female personnel in the Australian military, we would like to draw implications for the direction our military should go.

Detecting Adversarial Examples Using Edge-based Classification

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.67-76
    • /
    • 2023
  • Although deep learning models are making innovative achievements in the field of computer vision, the problem of vulnerability to adversarial examples continues to be raised. Adversarial examples are attack methods that inject fine noise into images to induce misclassification, which can pose a serious threat to the application of deep learning models in the real world. In this paper, we propose a model that detects adversarial examples using differences in predictive values between edge-learned classification models and underlying classification models. The simple process of extracting the edges of the objects and reflecting them in learning can increase the robustness of the classification model, and economical and efficient detection is possible by detecting adversarial examples through differences in predictions between models. In our experiments, the general model showed accuracy of {49.9%, 29.84%, 18.46%, 4.95%, 3.36%} for adversarial examples (eps={0.02, 0.05, 0.1, 0.2, 0.3}), whereas the Canny edge model showed accuracy of {82.58%, 65.96%, 46.71%, 24.94%, 13.41%} and other edge models showed a similar level of accuracy also, indicating that the edge model was more robust against adversarial examples. In addition, adversarial example detection using differences in predictions between models revealed detection rates of {85.47%, 84.64%, 91.44%, 95.47%, and 87.61%} for each epsilon-specific adversarial example. It is expected that this study will contribute to improving the reliability of deep learning models in related research and application industries such as medical, autonomous driving, security, and national defense.

Suitability Evaluation Method for Both Control Data and Operator Regarding Remote Control of Maritime Autonomous Surface Ships (자율운항선박 원격제어 관련 제어 데이터와 운용자의 적합성 평가 방법)

  • Hwa-Sop Roh;Hong-Jin Kim;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.214-220
    • /
    • 2024
  • Remote control is used for operating maritime autonomous surface ships. The operator controls the ship using control data generated by the remote control system. To ensure successful remote control, three principles must be followed: safety, reliability, and availability. To achieve this, the suitability of both the control data and operators for remote control must be established. Currently, there are no international regulations in place for evaluating remote control suitability through experiments on actual ships. Conducting such experiments is dangerous, costly, and time-consuming. The goal of this study is to develop a suitability evaluation method using the output values of control devices used in actual ship operation. The proposed method involves evaluating the suitability of data by analyzing the output values and evaluating the suitability of operators by examining their tracking of these output values. The experiment was conducted using a shore-based remote control system to operate the training ship 'Hannara' of Korea National Maritime and Ocean University. The experiment involved an iterative process of obtaining the operator's tracking value for the output value of the ship's control devices and transmitting and receiving tracking data between the ship and the shore. The evaluation results showed that the transmission and reception performance of control data was suitable for remote operation. However, the operator's tracking performance revealed a need for further education and training. Therefore, the proposed evaluation method can be applied to assess the suitability and analyze both the control data and the operator's compliance with the three principles of remote control.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

A Study on the Development of AI Utilization Guide Components at a Christian University (기독교대학의 AI활용가이드 구성요소 개발 연구)

  • Sungwon Kam;Minho Kim
    • Journal of Christian Education in Korea
    • /
    • v.77
    • /
    • pp.171-201
    • /
    • 2024
  • Purpose of Research : Since ChatGPT's 2022 release, the educational sector faces mixed reactions to generative AI, sparking innovation but raising concerns about student cognition and communication. While Christian colleges employ AI reflecting their values, secular institutions stress ethical usage. This study explores ethical AI use in these settings, aiming to integrate findings into educational practices. Research content and method : Analyzing AI use and ethics guidelines from 50 domestic and international universities, differences between Christian and secular institutions were explored. Data was categorized, conceptualized via open coding, and components were identified through axial coding. The importance of components for Christian colleges' AI guides was assessed based on the initial data and previous research, leading to the development of tailored AI utilization components for Christian universities. Conclusion : Studies revealed secular institutions have six AI guide components, while Christian colleges found seven in both utilization and ethics guides, focusing on truthfulness, responsibility, and diversity. Emphasizing the need for ethical AI use in Christian colleges, the findings advocate developing AI ethics guidelines to aid marginalized groups and establish a new educational paradigm through further research.

Research on Optimization Strategies for Random Forest Algorithms in Federated Learning Environments (연합 학습 환경에서의 랜덤 포레스트 알고리즘 최적화 전략 연구)

  • InSeo Song;KangYoon Lee
    • The Journal of Bigdata
    • /
    • v.9 no.1
    • /
    • pp.101-113
    • /
    • 2024
  • Federated learning has garnered attention as an efficient method for training machine learning models in a distributed environment while maintaining data privacy and security. This study proposes a novel FedRFBagging algorithm to optimize the performance of random forest models in such federated learning environments. By dynamically adjusting the trees of local random forest models based on client-specific data characteristics, the proposed approach reduces communication costs and achieves high prediction accuracy even in environments with numerous clients. This method adapts to various data conditions, significantly enhancing model stability and training speed. While random forest models consist of multiple decision trees, transmitting all trees to the server in a federated learning environment results in exponentially increasing communication overhead, making their use impractical. Additionally, differences in data distribution among clients can lead to quality imbalances in the trees. To address this, the FedRFBagging algorithm selects only the highest-performing trees from each client for transmission to the server, which then reselects trees based on impurity values to construct the optimal global model. This reduces communication overhead and maintains high prediction performance across diverse data distributions. Although the global model reflects data from various clients, the data characteristics of each client may differ. To compensate for this, clients further train additional trees on the global model to perform local optimizations tailored to their data. This improves the overall model's prediction accuracy and adapts to changing data distributions. Our study demonstrates that the FedRFBagging algorithm effectively addresses the communication cost and performance issues associated with random forest models in federated learning environments, suggesting its applicability in such settings.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

An Improved Online Algorithm to Minimize Total Error of the Imprecise Tasks with 0/1 Constraint (0/1 제약조건을 갖는 부정확한 태스크들의 총오류를 최소화시키기 위한 개선된 온라인 알고리즘)

  • Song, Gi-Hyeon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.493-501
    • /
    • 2007
  • The imprecise real-time system provides flexibility in scheduling time-critical tasks. Most scheduling problems of satisfying both 0/1 constraint and timing constraints, while the total error is minimized, are NP-complete when the optional tasks have arbitrary processing times. Liu suggested a reasonable strategy of scheduling tasks with the 0/1 constraint on uniprocessors for minimizing the total error. Song et at suggested a reasonable strategy of scheduling tasks with the 0/1 constraint on multiprocessors for minimizing the total error. But, these algorithms are all off-line algorithms. In the online scheduling, the NORA algorithm can find a schedule with the minimum total error for the imprecise online task system. In NORA algorithm, EDF strategy is adopted in the optional scheduling. On the other hand, for the task system with 0/1 constraint, EDF_Scheduling may not be optimal in the sense that the total error is minimized. Furthermore, when the optional tasks are scheduled in the ascending order of their required processing times, NORA algorithm which EDF strategy is adopted may not produce minimum total error. Therefore, in this paper, an online algorithm is proposed to minimize total error for the imprecise task system with 0/1 constraint. Then, to compare the performance between the proposed algorithm and NORA algorithm, a series of experiments are performed. As a conseqence of the performance comparison between two algorithms, it has been concluded that the proposed algorithm can produce similar total error to NORA algorithm when the optional tasks are scheduled in the random order of their required processing times but, the proposed algorithm can produce less total error than NORA algorithm especially when the optional tasks are scheduled in the ascending order of their required processing times.

The Characteristic of the Carrier's Liability Due to the Illegal Act of the Crew during International Air Transportation (국제항공운송 과정에서의 기장 등의 직무상 불법행위에 기한 운송인의 손해배상책임이 가지는 특수성)

  • Kim, Min-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.3
    • /
    • pp.3-37
    • /
    • 2020
  • The aircraft crew operating on international routes performs almost identical tasks as police officials in terms of dealing with the unlawful interference in the aircraft. This means that the liability question which is related to the law enforcement by the police officer may arise regarding the crew's performance of his or her duties. With regard to the carrier's liability due to the crew's unlawful action, there are distinctive characteristics from the liability due to police officers' unlawful action. In case of the claim for damages by the crew's unlawful action, the first question should be whether such action complies with the requirements under the Tokyo Convention 1963. If such action does not conform with the Tokyo Convention 1963, we should examine that claim under the State Compensation Act, the Montreal Convention 1999, and the Civil Act of Korea. The examination under the Tokyo Convention 1963 is not so different from the Korean Court's precedents. However, the court should consider the characteristics of the environment surrounding the crew. The action which is not indemnified under the Tokyo Convention 1963 should be examined under the tort laws. Because the aircraft crew is private persons entrusted with public duties under Korean Law, the State Compensation Act may apply. However, further studies regarding the harmonious interpretation with the Montreal Convention 1999 is needed. With regard to the carrier's liability, the Montreal Convention of 1999 should be applied to the crew's unlawful actions onboard. This is because the Montreal Convention of 1999 preempts the national law for the events that occurred during transportation, and there is no provision which excludes such unlawful actions from the scope of its application. On the other hand, the national law, such as the Civil Act of Korea, applies to unlawful actions taken after transportation. This is because the interpretation that infinitely expands the scope of the Montreal Convention 1999 should not be allowed. Given the foregoing, the standard of the claim for damages due to the crew's unlawful action varies depending on the place where the specific action was taken. As a result, the type of damage recoverable and the burden of proof also varies accordingly. Carriers and crew members must perform their duties with this in mind, but in particular, they should observe the proportionality, and when interpreting the law, it is necessary for the court or lawyer to consider the special characteristics of the work environment.