• Title/Summary/Keyword: 자동화 서비스 플랫폼

Search Result 74, Processing Time 0.027 seconds

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

A Internet of Things(IoT) based exploration robot design for remote control and monitoring (사물인터넷(IoT) 기반 원격 제어 및 모니터링이 가능한 탐사로봇 설계)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.185-190
    • /
    • 2015
  • The trend of Internet of things are changed from public and examples of corporate center to B2C service. As you can see, through the practice of domestic and international services Internet of Things, conventional disaster, disasters, such as the case of the public sector, factory automation company now mainly direct B2C (Business to Consumer) services are affecting the individual has spread. In this paper we propose a method of platforms and components, and network configuration plan for exploration robot design based on remote control and monitoring system with IoT.

Implementation of IFTTT-based Server for Controlling Internet Devices (사물인터넷 디바이스의 제어를 위한 IFTTT기반의 서버 구현)

  • Kim, Dong-min;Lim, Ji-yong;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.544-546
    • /
    • 2018
  • Things Internet technology is rapidly becoming a reality in many parts of our lives through various product services. As the perception of Internet services for things has become more common and the intention to purchase Internet devices has begun to increase, various Internet devices have appeared and the need for a server to control them has been emphasized. In addition, IFTTT, a representative Internet automation service platform, is continuously diversifying related services such as home appliances, light bulbs, and smart homes, and has a variety of Internet information such as weather information and news, which can be utilized through IFTTT. And MQTT, which is designed for use in low-power, low-bandwidth environments. This paper implements a server for controlling and managing Internet devices and related services based on IFTTT and MQTT.

  • PDF

The Research of Interworking System for Closed Plant Factories (식물공장을 위한 인터워킹 서비스 시스템에 대한 연구)

  • Lee, Myeongbae;Baek, Miran;Park, Jangwoo;Cho, Yongyun;Shin, Changsun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.91-97
    • /
    • 2018
  • The plant factory represents one of the future agricultural systems into which ubiquitous information technology (U-IT) is incorporated, including sensor networking, and helps minimize the influence of external experimental factors that constrain the use of existing greenhouse cultivation techniques. A plant factory's automated cultivation system does not merely provide convenience for crop cultivation, but also expandability as a platform that helps build a knowledge database based on its acquired information and develop education and other application services using the database. For the expansion of plant factory services, this study designed a plant factory interworking service (PFIS) which allows plant factories to share crop growth-related information efficiently among them and performed a test on the service and its implementation.

5G mobile network and ATSC 3.0 broadcasting network interworking trend and plan (5G 이동망과 ATSC 3.0 방송망 연동 동향 및 방안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.47-52
    • /
    • 2020
  • The introduction of virtualization technology in the broadcasting field is actively progressing broadcasting service automation and intelligence based on the effective operation of IT resources throughout the broadcasting industry ecosystem. In recent years, there is increasing interest in increasing the flexibility of various broadcasting resources and increasing the efficiency of interworking with other networks through network virtualization of the broadcasting network infrastructure. The fundamental transformation from the broadcasting network to the IP paradigm is facing a situation where it is necessary to solve various problems for the effective interworking of Internet-based service platforms and 5G networks and the development of new convergence services. In other words, for organic and effective interworking with the next-generation broadcasting network represented by ATSC 3.0, a mobile communication network represented by 5G, and the Internet, a number of difficulties must be solved. In this paper, the basic technology and status for the convergence of ATSC 3.0 broadcasting network and mobile communication network represented by 5G was examined, and a plan for the ATSC 3.0 broadcasting network and 5G network to interwork with each other as a network was described.

Near Realtime Packet Classification & Handling Mechanism for Visualized Security Management in Cloud Environments (클라우드 환경에서 보안 가시성 확보를 위한 자동화된 패킷 분류 및 처리기법)

  • Ahn, Myong-ho;Ryoo, Mi-hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.331-337
    • /
    • 2014
  • Paradigm shift to cloud computing has increased the importance of security. Even though public cloud computing providers such as Amazon, already provides security related service like firewall and identity management services, it is not suitable to protect data in cloud environments. Because in public cloud computing environments do not allow to use client's own security solution nor equipments. In this environments, user are supposed to do something to enhance security by their hands, so the needs of visualized security management arises. To implement visualized security management, developing near realtime data handling & packet classification mechanisms are crucial. The key technical challenges in packet classification is how to classify packet in the manner of unsupervised way without human interactions. To achieve the goal, this paper presents automated packet classification mechanism based on naive-bayesian and packet Chunking techniques, which can identify signature and does machine learning by itself without human intervention.

  • PDF

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

A Study of Big data-based Machine Learning Techniques for Wheel and Bearing Fault Diagnosis (차륜 및 차축베어링 고장진단을 위한 빅데이터 기반 머신러닝 기법 연구)

  • Jung, Hoon;Park, Moonsung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.75-84
    • /
    • 2018
  • Increasing the operation rate of components and stabilizing the operation through timely management of the core parts are crucial for improving the efficiency of the railroad maintenance industry. The demand for diagnosis technology to assess the condition of rolling stock components, which employs history management and automated big data analysis, has increased to satisfy both aspects of increasing reliability and reducing the maintenance cost of the core components to cope with the trend of rapid maintenance. This study developed a big data platform-based system to manage the rolling stock component condition to acquire, process, and analyze the big data generated at onboard and wayside devices of railroad cars in real time. The system can monitor the conditions of the railroad car component and system resources in real time. The study also proposed a machine learning technique that enabled the distributed and parallel processing of the acquired big data and automatic component fault diagnosis. The test, which used the virtual instance generation system of the Amazon Web Service, proved that the algorithm applying the distributed and parallel technology decreased the runtime and confirmed the fault diagnosis model utilizing the random forest machine learning for predicting the condition of the bearing and wheel parts with 83% accuracy.