• Title/Summary/Keyword: AI (Artificial Intelligence)

Search Result 1,960, Processing Time 0.03 seconds

Design and Implementation of Smart Factory System based on Manufacturing Data for Cosmetic Industry (화장품 제조업을 위한 제조데이터 기반의 스마트팩토리 시스템의 설계 및 구현)

  • Oh, Sewon;Jeong, Jongpil;Park, Jungsoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.149-162
    • /
    • 2021
  • This paper established a new smart factory based on manufacturing data for an introductory company focusing on the personalized cosmetics manufacturing industry. We build on an example of a system that collects, manages, and analyzes documents and data that were previously managed by CGMP-based analog for data-driven use. To this end, we have established a system that can collect all data in real time at the production site by introducing artificial intelligence smart factory platform LINK5 MOS and POP system, collecting PLC data, and introducing monitoring system and pin board. It also aims to create a new business cluster space based on this project.

History and Trends of Data Education in Korea - KISTI Data Education Based on 2001-2019 Statistics

  • Min, Jaehong;Han, Sunggeun;Ahn, Bu-young
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.133-139
    • /
    • 2020
  • Big data, artificial intelligence (AI), and machine learning are keywords that represent the Fourth industrial Revolution. In addition, as the development of science and technology, the Korean government, public institutions and industries want professionals who can collect, analyze, utilize and predict data. This means that data analysis and utilization education become more important. Education on data analysis and utilization is increasing with trends in other academy. However, it is true that not many academy run long-term and systematic education. Korea Institute of Science and Technology Information (KISTI) is a data ecosystem hub and one of its performance missions has been providing data utilization and analysis education to meet the needs of industries, institutions and governments since 1966. In this study, KISTI's data education was analyzed using the number of curriculum trainees per year from 2001 to 2019. With this data, the change of interest in education in information and data field was analyzed by reflecting social and historical situations. And we identified the characteristics of KISTI and trainees. It means that the identity, characteristics, infrastructure, and resources of the institution have a greater impact on the trainees' interest of data-use education.In particular, KISTI, as a research institute, conducts research in various fields, including bio, weather, traffic, disaster and so on. And it has various research data in science and technology field. The purpose of this study can provide direction forthe establishment of new curriculum using data that can represent KISTI's strengths and identity. One of the conclusions of this paper would be KISTI's greatest advantages if it could be used in education to analyze and visualize many research data. Finally, through this study, it can expect that KISTI will be able to present a new direction for designing data curricula with quality education that can fulfill its role and responsibilities and highlight its strengths.

Finding the Optimal Data Classification Method Using LDA and QDA Discriminant Analysis

  • Kim, SeungJae;Kim, SungHwan
    • Journal of Integrative Natural Science
    • /
    • v.13 no.4
    • /
    • pp.132-140
    • /
    • 2020
  • With the recent introduction of artificial intelligence (AI) technology, the use of data is rapidly increasing, and newly generated data is also rapidly increasing. In order to obtain the results to be analyzed based on these data, the first thing to do is to classify the data well. However, when classifying data, if only one classification technique belonging to the machine learning technique is applied to classify and analyze it, an error of overfitting can be accompanied. In order to reduce or minimize the problems caused by misclassification of the classification system such as overfitting, it is necessary to derive an optimal classification by comparing the results of each classification by applying several classification techniques. If you try to interpret the data with only one classification technique, you will have poor reasoning and poor predictions of results. This study seeks to find a method for optimally classifying data by looking at data from various perspectives and applying various classification techniques such as LDA and QDA, such as linear or nonlinear classification, as a process before data analysis in data analysis. In order to obtain the reliability and sophistication of statistics as a result of big data analysis, it is necessary to analyze the meaning of each variable and the correlation between the variables. If the data is classified differently from the hypothesis test from the beginning, even if the analysis is performed well, unreliable results will be obtained. In other words, prior to big data analysis, it is necessary to ensure that data is well classified to suit the purpose of analysis. This is a process that must be performed before reaching the result by analyzing the data, and it may be a method of optimal data classification.

Global Technical Knowledge Flow Analysis in Intelligent Information Technology : Focusing on South Korea (지능정보기술 분야에서의 글로벌 기술 지식 경쟁력 분석 : 한국을 중심으로)

  • Kwak, Gihyun;Yoon, Jungsub
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.24-38
    • /
    • 2021
  • This study aims to measure Korea's global competitiveness in intelligent information technology, which is the core technology of the 4th industrial revolution. For analysis, we collect patents of each field and prior patents cited by them, which are applied at the U.S. Patent Office (USPTO) between 2010 and 2018 from PATSTAT Online. A global knowledge transfer network was established by grouping citing- and cited-relationships at a national level. The in-degree centrality is used to evaluate technology acceptance, which indicates the process of absorbing existing technological knowledge to create new knowledge in each field. Second, to evaluate the impact of existing technological knowledge on the creation of new one, the out-degree centrality is investigated. Third, we apply the PageRank algorithm to qualitatively and quantitatively investigate the importance of the relationships between countries. As a result, it is confirmed through all the indicators that the AI sector is currently the least competitive.

Study on Video Content Delivery Scheme for Mobile Vehicles (이동 차량을 위한 동영상 콘텐츠 전송 기법에 관한 연구)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.41-45
    • /
    • 2021
  • This paper proposes a video content delivery scheme for vehicles. Today, we spend a lot of time commuting to work in vehicles such as trains and cars. In addition, the number of users who enjoy video content such as YouTube and Netflix in order to appease the boredom in the vehicle is increasing rapidly. Video content requires a larger amount of data usage than text-based content. Hence, the user's mobile communication data usage increases rapidly along with the cost. The proposed video content delivery scheme downloads a lot of video content in advance when the vehicle is in a free Wi-Fi area. In this way, it is possible to play video content in a vehicle at a low cost. It is expected that the proposed scheme can be applied to the Internet of Things(IoT) for moving objects.

A Study on the Strategic Application of National Defense Data for the Construction of Smart Forces in the 4th IR (4차 산업혁명시대 스마트 강군 건설을 위한 국방 데이터의 전략적 활용 방안연구)

  • Kim, Seyong;Kim, Junsang;Kang, Seokwon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.113-123
    • /
    • 2020
  • The fourth industrial revolution can be called the hyper-connected-based intelligent revolution triggered by advanced information technology and intelligent technology, and the basis for implementing these technologies is 'data'. This study proposes a way to strategically use data in order to lead this intelligent revolution in the defense area. First of all, implications through analysis of domestic and international trends and prior research and current status of defense data management were analyzed, and four directions for development were presented. If the government composes conditions for building, releasing, sharing, distribution, and convergence of defense data considering the environment of national defense in the future, it is expected that it will serve as a foundation and a shortcut to be a digitalized strong military through smart defense innovation in the era of the fourth industrial revolution.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

Risk Prediction Model of Legal Contract Based on Korean Machine Reading Comprehension (한국어 기계독해 기반 법률계약서 리스크 예측 모델)

  • Lee, Chi Hoon;Woo, Noh Ji;Jeong, Jae Hoon;Joo, Kyung Sik;Lee, Dong Hee
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.131-143
    • /
    • 2021
  • Commercial transactions, one of the pillars of the capitalist economy, are occurring countless times every day, especially small and medium-sized businesses. However, small and medium-sized enterprises are bound to be the legal underdogs in contracts for commercial transactions and do not receive legal support for contracts for fair and legitimate commercial transactions. When subcontracting contracts are concluded among small and medium-sized enterprises, 58.2% of them do not apply standard contracts and sign contracts that have not undergone legal review. In order to support small and medium-sized enterprises' fair and legitimate contracts, small and medium-sized enterprises can be protected from legal threats if they can reduce the risk of signing contracts by analyzing various risks in the contract and analyzing and informing them of toxic clauses and omitted contracts in advance. We propose a risk prediction model for the machine reading-based legal contract to minimize legal damage to small and medium-sized business owners in the legal blind spots. We have established our own set of legal questions and answers based on the legal data disclosed for the purpose of building a model specialized in legal contracts. Quantitative verification was carried out through indicators such as EM and F1 Score by applying pine tuning and hostile learning to pre-learned machine reading models. The highest F1 score was 87.93, with an EM value of 72.41.

Research on Deep Learning Performance Improvement for Similar Image Classification (유사 이미지 분류를 위한 딥 러닝 성능 향상 기법 연구)

  • Lim, Dong-Jin;Kim, Taehong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.1-9
    • /
    • 2021
  • Deep learning in computer vision has made accelerated improvement over a short period but large-scale learning data and computing power are still essential that required time-consuming trial and error tasks are involved to derive an optimal network model. In this study, we propose a similar image classification performance improvement method based on CR (Confusion Rate) that considers only the characteristics of the data itself regardless of network optimization or data reinforcement. The proposed method is a technique that improves the performance of the deep learning model by calculating the CRs for images in a dataset with similar characteristics and reflecting it in the weight of the Loss Function. Also, the CR-based recognition method is advantageous for image identification with high similarity because it enables image recognition in consideration of similarity between classes. As a result of applying the proposed method to the Resnet18 model, it showed a performance improvement of 0.22% in HanDB and 3.38% in Animal-10N. The proposed method is expected to be the basis for artificial intelligence research using noisy labeled data accompanying large-scale learning data.

Development of Wire/Wireless Communication Modules using Environmental Sensor Modules for LNG Storage Tanks (LNG 저장탱크용 환경 센서 모듈을 이용한 유무선 통신 모듈 개발)

  • Park, Byong Jin;Kim, Min Sung
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • Accidents are steadily occurring due to machine defects and carelessness during LNG storage operations. In previous studies, an environmental sensor module capable of measuring pressure, temperature, gas concentration, and flow to detect danger in advance was developed and the response speed according to the amount of leaked gas was measured. This paper proposes the development of a wired and wireless communication module that transmits data measured by the environmental sensor module to embedded devices connected to wired and wireless networks of SPI, UART, and LTE. First, a data communication module capable of interworking with an environmental sensor is designed. Design a protocol between devices in the Local Control Part and wired and wireless protocols in the Local Control Part and Remote Control Part. Ethernet, WiFi, and LTE communication modules were designed, and UART and SPI channels that can be linked with embedded controllers were designed. As a result, it was confirmed through a UI (User Interface) that each embedded device transmits data measured by the environmental sensor module while simultaneously communicating on a wired and wireless basis.