• Title/Summary/Keyword: AI Software

Search Result 525, Processing Time 0.028 seconds

TrapMI: Protecting Training Data to Evade Model Inversion Attack on Split Learning (TrapMI: 분할 학습에서 모델 전도 공격을 회피할 수 있는 훈련 데이터 보호 방법)

  • Hyun-Sik Na;Dae-Seon Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.234-236
    • /
    • 2023
  • Edge AI 환경에서의 DNNs 학습 방법 중 하나인 분할 학습은 모델 전도 공격으로 인해 입력 데이터의 프라이버시가 노출될 수 있다. 본 논문에서는 분할 학습 환경에서의 모델 전도 공격에 대한 기존 방어 기술들의 한계점을 회피할 수 있는 TrapMI 기술을 제안하고, 이를 통해 입력 이미지를 원 본 데이터 세트의 도메인에서 특정 타겟 이미지 도메인으로 이동시킴으로써 이미지 복원의 가능성을 최소화시킨다. 추가적으로, 테스트 과정에서 타겟 이미지의 정보를 알 수 없는 제약을 회피하기 위해 AutoGenerator를 구축한 후 실험을 통해 원본 데이터 보호 성능을 검증한다.

Development and Analysis of Low Cost Telecommand Processing System for Domestic Development Satellites (국내 개발 인공위성을 위한 저비용 원격명령 처리 시스템 구현 및 분석)

  • Park, Sang-Seob;Lee, Seongjin;Jun, Yong-Kee
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.6
    • /
    • pp.481-488
    • /
    • 2021
  • The satellite telecommand processing system is the only way to provide telecommands for status monitoring, control, and mission execution. Domestic satellites can be divided into science, technology, and multi-purpose satellites, and geostationary satellites. These Satellites uses CCSDS standard protocol to communicate with ground stations. However, existing domestic satellites use only software to decode telecommands which increases cost of software development and verification of the developed software. Performance of software only approach is relatively low compared to hardware. In this paper, we present ASIC processing system specifically designed to decode telecommands. The system consists of a telecommand RAM, a protocol RAM/ROM, an ASIC, an interface unit of FPGA, and a relay block. The system handles general commands and pulse commands that are used in satellites. We established a ground station equipment and test environment to verify the system functionality, The result shows that our system reduces the development cost by 1/5 and improves the performance by 105 times compared to the previous systems that decode telecommands only by software.

Personal Information Protection Recommendation System using Deep Learning in POI (POI 에서 딥러닝을 이용한 개인정보 보호 추천 시스템)

  • Peng, Sony;Park, Doo-Soon;Kim, Daeyoung;Yang, Yixuan;Lee, HyeJung;Siet, Sophort
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.377-379
    • /
    • 2022
  • POI refers to the point of Interest in Location-Based Social Networks (LBSNs). With the rapid development of mobile devices, GPS, and the Web (web2.0 and 3.0), LBSNs have attracted many users to share their information, physical location (real-time location), and interesting places. The tremendous demand of the user in LBSNs leads the recommendation systems (RSs) to become more widespread attention. Recommendation systems assist users in discovering interesting local attractions or facilities and help social network service (SNS) providers based on user locations. Therefore, it plays a vital role in LBSNs, namely POI recommendation system. In the machine learning model, most of the training data are stored in the centralized data storage, so information that belongs to the user will store in the centralized storage, and users may face privacy issues. Moreover, sharing the information may have safety concerns because of uploading or sharing their real-time location with others through social network media. According to the privacy concern issue, the paper proposes a recommendation model to prevent user privacy and eliminate traditional RS problems such as cold-start and data sparsity.

ChatGPT-based Software Requirements Engineering (ChatGPT 기반 소프트웨어 요구공학)

  • Jongmyung Choi
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.45-50
    • /
    • 2023
  • In software development, the elicitation and analysis of requirements is a crucial phase, and it involves considerable time and effort due to the involvement of various stakeholders. ChatGPT, having been trained on a diverse array of documents, is a large language model that possesses not only the ability to generate code and perform debugging but also the capability to be utilized in the domain of software analysis and design. This paper proposes a method of requirements engineering that leverages ChatGPT's capabilities for eliciting software requirements, analyzing them to align with system goals, and documenting them in the form of use cases. In software requirements engineering, it suggests that stakeholders, analysts, and ChatGPT should engage in a collaborative model. The process should involve using the outputs of ChatGPT as initial requirements, which are then reviewed and augmented by analysts and stakeholders. As ChatGPT's capability improves, it is anticipated that the accuracy of requirements elicitation and analysis will increase, leading to time and cost savings in the field of software requirements engineering.

Best Practices on Educational Service Platform with AI Approach

  • Hong, Je Seong;Park, Bo Kyung;Kwak, Jeil;Kim, R. Young Chul;Son, Hyun Seung
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.40-46
    • /
    • 2019
  • The current education is becoming more extensive with the application of various teaching methods. This is a problem that is so distributed that it is difficult for users to find the data and it takes a long time to find the information they need. Currently, various educational services, materials, and instruments are developed and scattered. Therefore, it is important to raise students' awareness of aptitude and career path with customized education tailored to students. Conventional education platforms have very difficult to choose the right materials for students because of the spread of educational programs and institution materials. To solve this, we propose a customized recommendation approach to recommend customized educational service materials and institution for students to teachers, which helps teachers conveniently choose materials suitable for their respective environments. On this new platform, the CNN algorithm provides recommended content for classes and students. For real service on the educational service platform, we implement this system for Jeil edus business. Through this mechanism, we expect to improve the quality of education by helping to select the right service.

DEVELOPMENT OF A MACHINE VISION SYSTEM FOR AN AUTOMOBILE PLASTIC PART INSPECTION

  • ANDRES N.S.;MARIMUTHU R.P.;EOM Y.K.;JANG B.C.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1131-1135
    • /
    • 2005
  • Since human is vulnerable to emotional, physical and environmental distractions, most human inspectors cannot sustain a consistent 8-hour inspection in a day specifically for small components like door locking levers. As an alternative for human inspection, presented in this study is the development of a machine vision inspection system (MVIS) purposely for door locking levers. Comprises the development is the structure of the MVIS components, designed to meet the demands, features and specifications of door locking lever manufacturing companies in increasing their production throughput upon keeping the quality assured. This computer-based MVIS is designed to perform quality measures of detecting missing portions and defects like burr on every door locking lever. NI Vision Builder software for Automatic Inspection (AI) is found to be the optimum solution in configuring the needed quality measures. The proposed software has measurement techniques such as edge detecting and pattern-matching which are capable of gauging, detecting missing portion and checking alignment. Furthermore, this study exemplifies the incorporation of the optimized NI Builder inspection environment to the pre-inspection and post-inspection subsystems.

  • PDF

The Study on the Quality Assessment Model of Aircraft Voice Recognition Software (항공기 음성인식 소프트웨어 품질 평가 모델 연구)

  • Lee, Seung-Mok
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.73-83
    • /
    • 2019
  • Voice Recognition has recently been improved with AI(Artificial Intelligence) and has greatly improved the false recognition rate and provides an effective and efficient Human Machine Interface (HMI). This trend has also been applied in the defense industry, particularly in the aviation, F-35. However, for the quality evaluation of Voice Recognition, the defense industry, especially the aircraft, requires measurable quantitative models. In this paper, the quantitative evaluation model is proposed for applying Voice Recognition to aircraft. For the proposal, the evaluation items are identified from the Voice Recognition technology and ISO/IEC 25000(SQuaRE) quality attributes. Using these two perspectives, the quantitative evaluation model is proposed under aircraft operation condition and confirms the evaluation results.

Teacher Training Program and Analysis of Teacher's Demands to Strengthen Artificial Intelligence Education (인공지능교육 역량 강화를 위한 교원 연수 프로그램과 교사 요구분석)

  • Jeon, In-Seong;Jun, Soo-Jin;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.4
    • /
    • pp.279-289
    • /
    • 2020
  • The purpose of this study is to apply the training program for teachers to strengthen the competence of artificial intelligence education in primary and secondary school teachers and to analyze its effectiveness and analyze teachers' demands for artificial intelligence education to provide basic research data. The referenced training program was designed based on the ADDIE model by selecting the educational contents based on the five core elements of AI, and teachers from the G Metropolitan Office of Education and the AI Education Research Association collaborated to develop the program. The effectiveness of the developed program and questionnaire of teacher needs analysis for AI teaching were examined for content validity. As a result of the training conducted by applying the developed program, satisfaction with each curriculum of the training and the possibility of application to the field were highly evaluated. It was found that teachers consider the need of teaching unplugged activities for AI education and basic AI experiences in elementary school level, and AI education contents including block programming languages and physical computing activities are needed to teach in middle school level.

A Study on Developing the Compliance for Infringement Response and Risk Management of Personal Information to Realize the Safe Artificial Intelligence Services in Artificial Intelligence Society (지능정보사회의 안전한 인공지능 서비스 구현을 위한 개인정보 침해대응 및 위기관리 컴플라이언스 개발에 관한 연구)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.1-14
    • /
    • 2022
  • This study tried to suggest crisis management compliance to prevent personal information infringement accidents that may occur in the process because the data including personal information is being processed in the artificial intelligence (AI) service process. To this end, first, the AI service provision process is divided into 3 processes such as service planning/data design and collection process, data pre-processing and purification process, and algorithm development and utilization process. And 3 processes are subdivided into 9 stages following to personal information processing stages to infringe personal information. All processes were investigated with literature and experts' Delphi. Second, the investigated personal information infringement factors were selected through FGI, Delphi, etc. for experts. Third, a survey was conducted with experts on the severity and possibility of each personal information infringement factor, and the validity and adequacy of the 94 responses were verified. Fourth, to present appropriate risk management compliance for personal information infringement factors in AI services, a method for calculating the risk level of personal information infringement is prepared by utilizing the asset value of personal information, personal information infringement factors, and the possibility of infringement accidents. Through this, the countermeasures for personal information infringement incidents were suggested according to the scored risk level.

A Study on the English Pronunciation for English-related Industry (교육산업 활성화를 위한 영어발음 연구)

  • Park, Hee-Suk
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.37-42
    • /
    • 2018
  • This study focuses on investigating and comparing the lengths of the five words, vowels, and the ratio of the length of vowels to that of words among the Korean college students with the English native speaker. English sentences were read and recorded by Korean subjects to do this experiment. The vowel lengths were measured from a sound spectrogram, the Praat software program, and these data were analyzed through statistical analysis. I could easily tell that there were differences between the groups and they were significant. In the English front low vowel /${\ae}$/, I was able to find out that native subjects pronounced differently from Korean subjects, and the differences were significant. However, the pronunciation of the English diphthong /ai/, native subjects pronounced significantly shorter than Korean subjects.