• Title/Summary/Keyword: 실제적 지능

Search Result 1,179, Processing Time 0.027 seconds

The study of Estimation model for the short-term travel time prediction (단기 통행시간예측 모형 개발에 관한 연구)

  • LEE Seung-jae;KIM Beom-il;Kwon Hyug
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.31-44
    • /
    • 2004
  • The study of Estimation model for the short-term travel time prediction. There is a different solution which has predicted the link travel time to solve this problem. By using this solution, the link travel time is predicted based on link conditions from time to time. The predicated link travel time is used to search the shortest path. Before providing a dynamic shortest path finding, the prediction model should be verified. To verify the prediction model, three models such as Kalman filtering, Stochastic Process, ARIMA. The ARIMA model should adjust optimal parameters according to the traffic conditions. It requires a frequent adjustment process of finding optimal parameters. As a result of these characteristics, It is difficult to use the ARIMA model as a prediction. Kalman Filtering model has a distinguished prediction capability. It is due to the modification of travel time predictive errors in the gaining matrix. As a result of these characteristics, the Kalman Filtering model is likely to have a non-accumulative errors in prediction. Stochastic Process model uses the historical patterns of travel time conditions on links. It if favorably comparable with the other models in the sense of the recurrent travel time condition prediction. As a result, for the travel time estimation, Kalman filtering model is the better estimation model for the short-term estimation, stochastic process is the better for the long-term estimation.

  • PDF

A Critical Review on Open, Useful, Reusable Government Data Index by OECD with Level of Domestic Open Government Data : Focusing on Comparison with Open Data Barometer (국내 공공데이터 개방수준을 통해서 본 OECD의 Open, Useful, Reusable Government Data Index에 대한 비판적 논의: Open Data Barometer와의 비교를 중심으로)

  • Seo, Hyung-Jun
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.43-67
    • /
    • 2017
  • In 2015, Korea won the first place among 30 countries in Open, Useful, and Reusable (OUR) Data Index, which is an OECD's open government data indicator. On the other hand, Korea was ranked the 17th among 86 countries in Open Data Barometer (ODB) of World Wide Web Foundation. In this study, the research subject comes from two reasonable academic doubts on why the gap is wide between the two indicators of Korea and whether the OUR Data Index made proper evaluation on Korea's open government data. Based on the assumption that there may be some critical points in the measuring method of OUR Data Index, the study conducted a comparison of the two indicators. The result found that first, the two indicators almost had no correlation to each other; second, OUR Data Index had a more vague evaluation framework as well as less amount of government data for evaluation than ODB; third, while the government support takes a significant share in the OUR Data Index, it is considered as a mere input element; and fourth, the OUR Data Index does not evaluate the impact of open government data, whereas ODB includes the impact of open data on the government, economy, and society.

The Analysis of Information Security Awareness Using A Text Mining Approach (텍스트 마이닝을 이용한 정보보호인식 분석 및 강화 방안 모색)

  • Lee, Tae-Heon;Youn, Young-Ju;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.76-94
    • /
    • 2016
  • Recently in Korea, the importance of information security awareness has been receiving a growing attention. Attacks such as social engineering and ransomware are hard to be prevented because it cannot be solved by information security technology. Also, the profitability of information security industry has been decreasing for years. Therefore, many companies try to find a new growth-engine and an entry to the foreign market. The main purpose of this paper is to draw out some information security issues and to analyze them. Finally, this study identifies issues and suggests how to improve the situation in Korea. For this, topic modeling analysis has been used to find information security issues of each country. Moreover, the score of sentiment analysis has been used to compare them. The study is exploring and explaining what critical issues are and how to improve the situation based on the identified issues of the Korean information security industry. Also, this study is also demonstrating how text mining can be applied to the context of information security awareness. From a pragmatic perspective, the study has the implications for information security enterprises. This study is expected to provide a new and realistic method for analyzing domestic and foreign issues using the analysis of real data of the Twitter API.

Place Recognition Using Ensemble Learning of Mobile Multimodal Sensory Information (모바일 멀티모달 센서 정보의 앙상블 학습을 이용한 장소 인식)

  • Lee, Chung-Yeon;Lee, Beom-Jin;On, Kyoung-Woon;Ha, Jung-Woo;Kim, Hong-Il;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.64-69
    • /
    • 2015
  • Place awareness is an essential for location-based services that are widely provided to smartphone users. However, traditional GPS-based methods are only valid outdoors where the GPS signal is strong and also require symbolic place information of the physical location. In this paper, environmental sounds and images are used to recognize important aspects of each place. The proposed method extracts feature vectors from visual, auditory and location data recorded by a smartphone with built-in camera, microphone and GPS sensors modules. The heterogeneous feature vectors were then learned by an ensemble learning method that learns each group of feature vectors for each classifier respectively and votes to produce the highest weighted result. The proposed method is evaluated for place recognition using a data group of 3000 samples in six places and the experimental results show a remarkably improved recognition accuracy when using all kinds of sensory data comparing to results using data from a single sensor or audio-visual integrated data only.

A Study on UI Prototyping Based on Personality of Things for Interusability in IoT Environment (IoT 환경에서 인터유저빌리티(Interusability) 개선을 위한 사물성격(Personality of Things)중심의 UI 프로토타이핑에 대한 연구)

  • Ahn, Mikyung;Park, Namchoon
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.2
    • /
    • pp.31-44
    • /
    • 2018
  • In the IoT environment, various things could be connected. Those connected things learn and operate themselves, by acquiring data. As human being, they have self-learning and self-operating systems. In the field of IoT study, therefore, the key issue is to design communication system connecting both of the two different types of subjects, human being(user) and the things. With the advent of the IoT environment, much research has been done in the field of UI design. It can be seen that research has been conducted to take complex factors into account through keywords such as multi-modality and interusability. However, the existing UI design method has limitations in structuring or testing interaction between things and users of IoT environment. Therefore, this paper suggests a new UI prototyping method. In this paper, the major analysis and studies are as follows: (1) defined what is the behavior process of the things (2) analyzed the existing IoT product (3) built a new framework driving personality types (4) extracted three representative personality models (5) applied the three models to the smart home service and tested UI prototyping. It is meaningful with that this study can confirm user experience (UX) about IoT service in a more comprehensive way. Moreover, the concept of the personality of things will be utilized as a tool for establishing the identity of artificial intelligence (AI) services in the future.

  • PDF

An Analysis of Change in the Employment Structure Data Caused by the Industrial Revolution (산업혁명에 따른 고용구조 변화 데이터 분석)

  • Kim, JeaYoung;Kim, Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.7 no.3
    • /
    • pp.57-70
    • /
    • 2017
  • It is anticipated that the employment structure of the whole industry will change drastically as the Fourth Industrial Revolution era arrives. Particularly, there are numerous reseraches that the development of artifical intelligence will promote automation causing jobs in manufacturing industry to decrease; thus, the economy will be reorganized with service-centered jobs, which heavily depend on human ability. This study was conducted to verify the trend-forecasting model based on the theoretical analysis. We analyzed the change in employment structure over the past decades in each country and period to gain insights from the changes in the employment structure caused by the Fourth Industrial Revoltion. The results of this study are as follows: First, we investigaed whether the current economy is moving along the U-shaped model suggested by an existing researcher. As a result of the analysis, the data substantiated that the change of the employment structure is moving along the U-shaped model. It is also suggested that this U-shaped trend is expected to accelerate in the era of the Fourth Industrial Revolution. In the future, more accurate data analyses are needed to verify the model, and additional researches on the change in the employment structed is also needed.

Development of the Efficient DAML+OIL Document Management System to support the DAML-S Services in the Embedded Systems (내장형 시스템에서 DAML-S서비스 지원을 위한 효율적인 DAML+OIL문서 관리 시스템)

  • Kim Hag Soo;Jung Moon-young;Cha Hyun Seok;Son Jin Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.36-49
    • /
    • 2005
  • Recently, many researchers have given high attention to the semantic web services based on the semantic web technology While existing web services use the XML-based web service description language, WSDL, semantic web services are utilizing web service description languages such as DAML-S in ontology languages. The researchers of semantic web services are generally focused on web service discovery, web service invocation, web service selection and composition, and web service execution monitoring. Especially, the semantic web service discovery as the basis to accomplish the ultimate semantic web service environment has some different properties from previous information discovery areas. Hence, it is necessary to develop the storage system and discovery mechanism appropriate to the semantic well description languages. Even though some related systems have been developed, they are not appropriate for the embedded system environment, such as intelligent robotics, in which there are some limitations on memory disk space, and computing power In this regard, we in the embedded system environment have developed the document management system which efficiently manages the web service documents described by DAML-S for the purpose of the semantic web service discovery, In addition, we address the distinguishing characteristics of the system developed in this paper, compared with the related researches.

The Method of Power Domain Ontology Construction and Reasoning based on Power Business Platform (전력 비즈니스 플랫폼 기반의 전력 도메인 온톨로지 구축 및 추론 방법)

  • Hong, Taekeun;Yu, Kyungho;Kim, Pankoo
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.51-62
    • /
    • 2020
  • Starting with the "Smart Grid National Road Map" in 2010, the Smart Grid 2030 was introduced through the basic plan and implementation plan of the intelligent power grid with the goal of building the world's first national smart grid. In this paper, we intend to build a power domain ontology based on the power business platform based on the upper and lower conceptual models of the "Smart Grid Interoperability Standard Framework and Roadmap", the standard of implementation plan. Ontology is suitable for expressing and utilizing the smart grid conceptual model because it considers hierarchical structure as knowledge defines the properties of entities and relationships between entities, but there is no research related to them. Therefore, in this paper, the upper ontology was defined as a major category for smart grid-related fields, and the lower ontology was defined as detailed systems and functions for the upper ontology to construct the ontology. In addition, scenarios in various situations that could occur in the power system were constructed and significant inference results were derived through inference engines and queries.

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

A Study on Design of Smart Home Service Robot McBot II (스마트 홈 서비스 로봇 맥봇II의 설계에 관한 연구)

  • Kim, Seung-Woo;Kim, Hi-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1824-1832
    • /
    • 2011
  • In this paper, a smart home service robot McBot II is newly developed in much more practical and intelligent system than McBot I which we had developed a few years ago. Thus far, vacuum-cleaners have lightened the burden of household chores but the operational labor that vacuum-cleaners entail has been very severe. Recently, a cleaning robot was commercialized to solve but it also was not successful because it still had the problem of mess-cleanup, which pertained to the clean-up of large trash and the arrangement of newspapers, clothes, etc. Hence, we develop a new home mess-cleanup robot McBot II to completely overcome this problem on real environments. The mechanical design and the basic control of McBot II, which performs mess-cleanup function etc. in house, is actually focused in this paper. McBot II is mechanically modeled in the same method that the human works in door by using the waist and the hands. The big-ranged vertical lift and the shoulder joints to be able to forward move are mechanically designed for the operating function as the human's waist when the robot works. The mobility of McBot II is designed in the holonomic mobile robot for the collision avoidance of obstacle and the high speed navigation on the small area in door. Finally, good performance of McBot II, which has been optimally desinged, is confirmed through the experimental results for the control of the robotic body, mobility, arms and hands in this paper.