• Title/Summary/Keyword: AI Generation Technology

Search Result 156, Processing Time 0.027 seconds

Study on the feasibility of using AI image generation tool for fashion design development -Focused on the use of Midjourney (패션디자인 개발을 위한 AI 이미지 생성 도구의 활용 가능성 연구 -미드저니(Midjourney)의 활용을 중심으로)

  • Park, Keunsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.237-244
    • /
    • 2023
  • Today, AI is being applied to various industrial fields, leading to a paradigm shift in the overall industry. In the fashion industry, AI is also used to predict trends and provide various services for consumers, and in particular, AI image creation tools have the potential as a tool for fashion design development. This study investigated the possibilities and limitations of using Midjourny for fashion design development by creating images using Midjourney among AI image creation tools and identifying its characteristics. The characteristics of images created in Midjourney are as follows. First, it has the intuitiveness to create images by intuitively applying or combining images corresponding to commands. Second, there is randomness in which different images are generated when the same command is entered at different times. Third, when using existing images and commands together, the image created in Midjourney is more dependent on the existing image than the command. In conclusion, Midjourny's various image creation functions and the ability to change images according to commands can be helpful in developing original fashion designs. However, it is important to note that fashion designs that cannot be worn or made are sometimes presented. It is expected that the results of this study will serve as basic data for the use of AI image creation tools for fashion design development.

Distributed AI Learning-based Proof-of-Work Consensus Algorithm (분산 인공지능 학습 기반 작업증명 합의알고리즘)

  • Won-Boo Chae;Jong-Sou Park
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2022
  • The proof-of-work consensus algorithm used by most blockchains is causing a massive waste of computing resources in the form of mining. A useful proof-of-work consensus algorithm has been studied to reduce the waste of computing resources in proof-of-work, but there are still resource waste and mining centralization problems when creating blocks. In this paper, the problem of resource waste in block generation was solved by replacing the relatively inefficient computation process for block generation with distributed artificial intelligence model learning. In addition, by providing fair rewards to nodes participating in the learning process, nodes with weak computing power were motivated to participate, and performance similar to the existing centralized AI learning method was maintained. To show the validity of the proposed methodology, we implemented a blockchain network capable of distributed AI learning and experimented with reward distribution through resource verification, and compared the results of the existing centralized learning method and the blockchain distributed AI learning method. In addition, as a future study, the thesis was concluded by suggesting problems and development directions that may occur when expanding the blockchain main network and artificial intelligence model.

A Study on the Data Literacy Education in the Library of the Chat GPT, Generative AI Era (ChatGPT, 생성형 AI 시대 도서관의 데이터 리터러시 교육에 대한 연구)

  • Jeong-Mee Lee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.3
    • /
    • pp.303-323
    • /
    • 2023
  • The purpose of this study is to introduce this language model in the era of generative AI such as ChatGPT, and to provide direction for data literacy education components in libraries using it. To this end, the following three research questions are proposed. First, the technical features of ChatGPT-like language models are examined, and then, it is argued that data literacy education is necessary for the proper and accurate use of information by users using a service platform based on generative AI technology. Finally, for library data literacy education in the ChatGPT era, it is proposed a data literacy education scheme including seven components such as data understanding, data generation, data collection, data verification, data management, data use and sharing, and data ethics. In conclusion, since generative AI technologies such as ChatGPT are expected to have a significant impact on users' information utilization, libraries should think about the advantages, disadvantages, and problems of these technologies first, and use them as a basis for further improving library information services.

A Study on Prompt-based Persona Dialogue Generation (Prompt를 활용한 페르소나 대화 생성 연구)

  • Yoona Jang;Kisu Yang;Hyeonseok Moon;Jaehyung Seo;Jungwoo Lim;Junyoung Son;Chanjun Park;Kinam Park;Heuiseok Lim
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.77-81
    • /
    • 2022
  • 최근 사전학습 언어모델에 내재된 지식을 최대한으로 활용하고자 태스크에 대한 설명을 입력으로 주는 manual prompt tuning 방법과 자연어 대신 학습가능한 파라미터로 태스크에 대한 이해를 돕는 soft prompt tuning 방법론이 자연어처리 분야에서 활발히 연구가 진행되고 있다. 이에 본 연구에서는 페르소나 대화 생성 태스크에서 encoder-decoder 구조 기반의 사전학습 언어모델 BART를 활용하여 manual prompt tuning 및 soft prompt tuning 방법을 고안하고, 파인튜닝과의 성능을 비교한다. 전체 학습 데이터에 대한 실험 뿐 아니라, few-shot 세팅에서의 성능을 확인한다.

  • PDF

Knowledge-grounded Dialogue Generation Using Domain-level Learning Approach for Practical Services (현업 서비스를 위한 도메인 수준 학습 방법을 활용한 지식 기반 대화생성)

  • Chae-Gyun Lim;Young-Seob Jeong;ChangWon Ok;Ho-Jin Choi
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.619-623
    • /
    • 2022
  • 대화생성은 대규모 학습 데이터로부터 사전 학습된 언어모델을 활용한 도전적인 다운스트림 태스크 중 하나이다. 대화에서 특정한 지식에 대한 맥락이 보존된 응답 문장을 생성하기 위한 기술의 일환으로써 지식 기반 대화생성이 연구되고 있으며, 현업에서는 사업목표에 따른 대화 서비스를 제공하는 목적으로 이러한 기술을 적용할 수 있다. 본 논문에서는, 각각의 서비스 도메인에 특화된 모델을 적절히 활용 가능하도록 전체 데이터를 도메인별로 구분하여 학습한 다수의 대화생성 모델을 구축한다. 또한, 특정 도메인의 데이터로 학습된 모델이 나머지 도메인에서 어떤 수준의 대화생성이 가능한지 비교 분석함으로써 개별 학습된 모델들이 도메인의 특성에 따라 서로 다른 영향력이나 연관성을 나타낼 가능성을 확인한다. 이러한 실험적인 분석 결과를 바탕으로 현업의 서비스에서 개별 도메인에 특화된 모델이 적절히 활용하는 것이 유용함을 확인하고자 한다.

  • PDF

A Study on the Application Trends of Next-Generation Solar Cells and the Future Prospects of Smart Textile Hybrid Energy Harvesting Devices : Focusing on Convergence with Industrial Materials (차세대 태양전지의 활용 동향 및 스마트 텍스타일 하이브리드 에너지 하베스팅 소자의 미래전망에 관한 연구 : 산업 소재와의 융합 중심)

  • Park, Boong-Ik
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.151-158
    • /
    • 2021
  • In this paper, we analyzed the latest research trends, challenges, and potential applications of next-generation solar cell materials in various industrial fields. In addition, future prospects and possibilities of Smart Textile Hybrid Energy Harvesting Devices that will supply electricity by combining with wearable IoT devices are presented. The hybrid textile energy harvesting device fused next-generation solar cells with tribo-piezoelectric devices will develop into new 'Convergence Integrated Smart Wear' by combining the material itself with wearable IoT devices in the era of the 4th industrial revolution. The next-generation nanotechnology and devices proposed in this paper will be applied to the field of smart textile with an energy harvesting function. And we hope it will be a paradigm shift that evolves into creative products which provide AI services such as medical & healthcare by convergence with the future smart wear industry.

Generative AI service implementation using LLM application architecture: based on RAG model and LangChain framework (LLM 애플리케이션 아키텍처를 활용한 생성형 AI 서비스 구현: RAG모델과 LangChain 프레임워크 기반)

  • Cheonsu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.129-164
    • /
    • 2023
  • In a situation where the use and introduction of Large Language Models (LLMs) is expanding due to recent developments in generative AI technology, it is difficult to find actual application cases or implementation methods for the use of internal company data in existing studies. Accordingly, this study presents a method of implementing generative AI services using the LLM application architecture using the most widely used LangChain framework. To this end, we reviewed various ways to overcome the problem of lack of information, focusing on the use of LLM, and presented specific solutions. To this end, we analyze methods of fine-tuning or direct use of document information and look in detail at the main steps of information storage and retrieval methods using the retrieval augmented generation (RAG) model to solve these problems. In particular, similar context recommendation and Question-Answering (QA) systems were utilized as a method to store and search information in a vector store using the RAG model. In addition, the specific operation method, major implementation steps and cases, including implementation source and user interface were presented to enhance understanding of generative AI technology. This has meaning and value in enabling LLM to be actively utilized in implementing services within companies.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

Automatic Poster Generation System Using Protagonist Face Analysis

  • Yeonhwi You;Sungjung Yong;Hyogyeong Park;Seoyoung Lee;Il-Young Moon
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.287-293
    • /
    • 2023
  • With the rapid development of domestic and international over-the-top markets, a large amount of video content is being created. As the volume of video content increases, consumers tend to increasingly check data concerning the videos before watching them. To address this demand, video summaries in the form of plot descriptions, thumbnails, posters, and other formats are provided to consumers. This study proposes an approach that automatically generates posters to effectively convey video content while reducing the cost of video summarization. In the automatic generation of posters, face recognition and clustering are used to gather and classify character data, and keyframes from the video are extracted to learn the overall atmosphere of the video. This study used the facial data of the characters and keyframes as training data and employed technologies such as DreamBooth, a text-to-image generation model, to automatically generate video posters. This process significantly reduces the time and cost of video-poster production.

Trends in Hardware Acceleration Techniques for Fully Homomorphic Encryption Operations (완전동형암호 연산 가속 하드웨어 기술 동향)

  • Park, S.C.;Kim, H.W.;Oh, Y.R.;Na, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.1-12
    • /
    • 2021
  • As the demand for big data and big data-based artificial intelligence (AI) technology increases, the need for privacy preservations for sensitive information contained in big data and for high-speed encryption-based AI computation systems also increases. Fully homomorphic encryption (FHE) is a representative encryption technology that preserves the privacy of sensitive data. Therefore, FHE technology is being actively investigated primarily because, with FHE, decryption of the encrypted data is not required in the entire data flow. Data can be stored, transmitted, combined, and processed in an encrypted state. Moreover, FHE is based on an NP-hard problem (Lattice problem) that cannot be broken, even by a quantum computer, because of its high computational complexity and difficulty. FHE boasts a high-security level and therefore is receiving considerable attention as next-generation encryption technology. However, despite being able to process computations on encrypted data, the slow computation speed due to the high computational complexity of FHE technology is an obstacle to practical use. To address this problem, hardware technology that accelerates FHE operations is receiving extensive research attention. This article examines research trends associated with developments in hardware technology focused on accelerating the operations of representative FHE schemes. In addition, the detailed structures of hardware that accelerate the FHE operation are described.