• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,433, Processing Time 0.035 seconds

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

Smart Healthcare in the Era of the Covid-19 Pandemic: Strategies and Tasks for Mental Health Social Work (코로나시대 스마트헬스케어의 적용가능성과 과제: 정신건강 사회복지 분야를 중심으로)

  • Lee, Jieha;Lee, Hyunjin;Hong, Seunghye;Park, Young
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.679-688
    • /
    • 2022
  • This paper focuses on the usability of smart healthcare based on the development of Information and Communication Technology(ICT), briefly introduces concepts and the current status related to smart healthcare, and discusses strategies and future tasks in the field of mental health welfare in the COVID-19 era. This paper first introduces the smart healthcare programs of the National Mental Health Center and the Seoul Mental Health Welfare Center. Second, we introduce various smart healthcare programs used in Germany, China, the U.S., and Australia, review the actual examples, and examine both public and private responsiveness. Finally, we examine the possibility of using smart healthcare in the mental health social work system in South Korea and examine future tasks and implications. This paper would contribute to the growth of world-class mental health social work services.

A Study on Major Issues of Artificial Intelligence Using Keyword Analysis of Papers: Focusing on KCI Journals in the Field of Social Science (논문 키워드 분석을 통한 인공지능의 주요 이슈에 관한 고찰 : 사회과학 분야의 KCI 등재학술지를 중심으로)

  • Chung, Do-Bum;You, Hwasun;Mun, Hee Jin
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.1-9
    • /
    • 2022
  • Today, artificial intelligence (AI) has emerged as a key driver of national competitiveness, but it is also causing unexpected side effects in society. This study intends to examine major social issues by collecting papers on AI targeting KCI journals in the field of social science. Therefore, we conducted keyword analysis of papers from 2016 to 2020. As a result of the analysis, the keywords for 'robot' and 'education' appeared the most, and the top six clusters (issues) were derived through the keyword network. The main issues are as follows: the background and/or basic concept of AI, AI education, side effects of AI, legal issues of AI-based creations, intention to use AI products/services, and AI ethics. The results of this study can be used to expand the discussion on the social aspects of AI and to find policy directions at the national level.

Performance Comparison of Task Partitioning Methods in MEC System (MEC 시스템에서 태스크 파티셔닝 기법의 성능 비교)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.139-146
    • /
    • 2022
  • With the recent development of the Internet of Things (IoT) and the convergence of vehicles and IT technologies, high-performance applications such as autonomous driving are emerging, and multi-access edge computing (MEC) has attracted lots of attentions as next-generation technologies. In order to provide service to these computation-intensive tasks in low latency, many methods have been proposed to partition tasks so that they can be performed through cooperation of multiple MEC servers(MECSs). Conventional methods related to task partitioning have proposed methods for partitioning tasks on vehicles as mobile devices and offloading them to multiple MECSs, and methods for offloading them from vehicles to MECSs and then partitioning and migrating them to other MECSs. In this paper, the performance of task partitioning methods using offloading and migration is compared and analyzed in terms of service delay, blocking rate and energy consumption according to the method of selecting partitioning targets and the number of partitioning. As the number of partitioning increases, the performance of the service delay improves, but the performance of the blocking rate and energy consumption decreases.

Transfer Learning Technique for Accelerating Learning of Reinforcement Learning-Based Horizontal Pod Autoscaling Policy (강화학습 기반 수평적 파드 오토스케일링 정책의 학습 가속화를 위한 전이학습 기법)

  • Jang, Yonghyeon;Yu, Heonchang;Kim, SungSuk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.105-112
    • /
    • 2022
  • Recently, many studies using reinforcement learning-based autoscaling have been performed to make autoscaling policies that are adaptive to changes in the environment and meet specific purposes. However, training the reinforcement learning-based Horizontal Pod Autoscaler(HPA) policy in a real environment requires a lot of money and time. And it is not practical to retrain the reinforcement learning-based HPA policy from scratch every time in a real environment. In this paper, we implement a reinforcement learning-based HPA in Kubernetes, and propose a transfer leanring technique using a queuing model-based simulation to accelerate the training of a reinforcement learning-based HPA policy. Pre-training using simulation enabled training the policy through simulation experience without consuming time and resources in the real environment, and by using the transfer learning technique, the cost was reduced by about 42.6% compared to the case without transfer learning technique.

Energy-Efficient MEC Offloading Decision Algorithm in Industrial IoT Environments (산업용 IoT 환경에서 MEC 기반의 에너지 효율적인 오프로딩 결정 알고리즘)

  • Koo, Seolwon;Lim, YuJin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.291-296
    • /
    • 2021
  • The development of the Internet of Things(IoT) requires large computational resources for tasks from numerous devices. Mobile Edge Computing(MEC) has attracted a lot of attention in the IoT environment because it provides computational resources geographically close to the devices. Task offloading to MEC servers is efficient for devices with limited battery life and computational capability. In this paper, we assumed an industrial IoT environment requiring high reliability. The complexity of optimization problem in industrial IoT environment with many devices and multiple MEC servers is very high. To solve this problem, the problem is divided into two. After selecting the MEC server considering the queue status of the MEC server, we propose an offloading decision algorithm that optimizes reliability and energy consumption using genetic algorithm. Through experiments, we analyze the performance of the proposed algorithm in terms of energy consumption and reliability.

A Study on Dynamic Channel Assignment to Increase Uplink Performance in Ultra Dense Networks (초고밀도 네트워크에서 상향링크 성능향상을 위한 유동적 채널할당 연구)

  • Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.25-31
    • /
    • 2022
  • In ultra dense networks (UDNs), macro user equipments (MUEs) have significant interference from small-cell access points (SAPs) since a number of SAPs are deployed in the coverage of macro base stations of 5G mobile communication systems. In this paper, we propose a dynamic channel assignment scheme to increase the performance of MUEs for the uplink of UDNs even though the number of SAPs is increased. The target of the proposed dynamic channel assignment scheme is that the signal-to-interference and noise ratio (SINR) of MUEs is above a given SINR threshold assigning different subchannels to SUEs from those of MUEs. Simulation results show that the proposed dynamic channel assignment scheme outperforms others in terms of the mean MUE capacity even though the mean SUE capacity is decreased a little lower.

Edge Caching Strategy with User Mobility in Heterogeneous Cellular Network Environments (이종 셀룰러 네트워크 환경에서 사용자 이동성을 고려한 엣지 캐싱 기법)

  • Choi, Yoonjeong;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2022
  • As the use of mobile data increases, the proportion of video content is increasing steeply. In order to solve problems that arise when mobile users receive data from geographically remote cloud servers, methods of caching data in advance to edge servers geographically close to the users are attracting lots of attention. In this paper, we present a caching policy that stores data on Small Cell Base Station(SBS) to effectively provide content files to mobile users by applying a delayed offloading scheme in a cellular network. The goal of the proposed policy is to minimize the size of data transmitted from Macro Base Station(MBS) because the delayed offloading scheme requires more cost than when downloaded from MBS than from SBS. The caching policy is proposed to determine the size of content file and which content file to be cached to SBS using the probability of mobile users' paths and the popularity of content files, and to replace content files in consideration of the overlapping coverage of SBS. In addition, through performance evaluation, it has been proven that the proposed policy reduces the size of data downloaded from MBS compared to other algorithms.

Research on depression and emergency detection model using smartphone sensors (스마트폰 센서를 통한 우울증 탐지 및 위급상황 탐지 모델 연구)

  • Mingeun Son;Gangpyo Lee;Jae Yong Park;Min Choi
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.9-18
    • /
    • 2023
  • Due to the deepening of COVID-19, high-intensity social distancing has been prolonged and many social problems have been cured. In particular, physical and psychological isolation occurred due to the non-face-to-face system and a lot of damage occurred. The various social problems caused by Corona acted as severe stress for all those affected by Corona 19, and eventually acted as a factor threatening mental health such as depression. While the number of people suffering from mental illness is increasing, the actual use of mental health services is low. Therefore, it is necessary to establish a system for people suffering from mental health problems. Therefore, in this study, depression detection and emergency detection models were constructed based on sensor information using smartphones from depressed subjects and general subjects. For the detection of depression and emergencies, VAE, DAGMM, ECOD, COPOD, and LGBM algorithms were used. As a result of the study, the depression detection model had an F1 score of 0.93 and the emergency situation detection model had an F1 score of 0.99. direction.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.