• Title/Summary/Keyword: AI Software

Search Result 525, Processing Time 0.024 seconds

A study on the analysis of virtual reality platform API for virtual reality (VR) development

  • Lee, Byong-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.23-30
    • /
    • 2020
  • As the 4th industrial revolution emerged, the latest technologies such as IoT, AI, Big data, AR/VR/XR are emerging. However, in the field of virtual reality (VR) technology platform services, there is no standardization and systematic support. In addition, various platform technologies related to virtual reality have been presented, making it difficult to select an API that should be selected for development. In this study, we analyzed the method for virtual reality development and the virtual reality (VR) technology that is being serviced by users. In addition, by presenting the advantages and disadvantages of each development platform, we intend to present a reference point for developers to select an efficient platform. In addition, it will help the developer to select an effective equipment and software platform in comparison with the advantages and disadvantages of various HMD devices used in virtual reality. The virtual reality (VR) development environment test used products from Oculus, and the software development environment was tested with two types: WebBased VR and HMD embedded.

Exploring Information Ethics Issues based on Text Mining using Big Data from Web of Science (Web of Science 빅데이터를 활용한 텍스트 마이닝 기반의 정보윤리 이슈 탐색)

  • Kim, Han Sung
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.3
    • /
    • pp.67-78
    • /
    • 2019
  • The purpose of this study is to explore information ethics issues based on academic big data from Web of Science (WoS) and to provide implications for information ethics education in informatics subject. To this end, 318 published papers from WoS related to information ethics were text mined. Specifically, this paper analyzed the frequency of key-words(TF, DF, TF-IDF), information ethics issues using topic modeling, and frequency of appearances by year for each issue. This paper used 'tm', 'topicmodel' package of R for text mining. The main results are as follows. First, this paper confirmed that the words 'digital', 'student', 'software', and 'privacy' were the main key-words through TF-IDF. Second, the topic modeling analysis showed 8 issues such as 'Professional value', 'Cyber-bullying', 'AI and Social Impact' et al., and the proportion of 'Professional value' and 'Cyber-bullying' was relatively high. This study discussed the implications for information ethics education in Korea based on the results of this analysis.

A Normalized Loss Function of Style Transfer Network for More Diverse and More Stable Transfer Results (다양성 및 안정성 확보를 위한 스타일 전이 네트워크 손실 함수 정규화 기법)

  • Choi, Insung;Kim, Yong-Goo
    • Journal of Broadcast Engineering
    • /
    • v.25 no.6
    • /
    • pp.980-993
    • /
    • 2020
  • Deep-learning based style transfer has recently attracted great attention, because it provides high quality transfer results by appropriately reflecting the high level structural characteristics of images. This paper deals with the problem of providing more stable and more diverse style transfer results of such deep-learning based style transfer method. Based on the investigation of the experimental results from the wide range of hyper-parameter settings, this paper defines the problem of the stability and the diversity of the style transfer, and proposes a partial loss normalization method to solve the problem. The style transfer using the proposed normalization method not only gives the stability on the control of the degree of style reflection, regardless of the input image characteristics, but also presents the diversity of style transfer results, unlike the existing method, at controlling the weight of the partial style loss, and provides the stability on the difference in resolution of the input image.

A Study on Development and Application of Artificial Intelligence Education Program using Robot (로봇 활용 인공지능 교육 프로그램 개발과 적용에 관한 연구)

  • Yoo, Inhwan;Bae, Youngkwon;Park, Daeryoon;Ahn, Joongmin;Kim, Wooyeol
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.5
    • /
    • pp.443-451
    • /
    • 2020
  • In elementary school software education, a programming process is experienced through a simple problem solving process. And even this experience emphasizes that the problem-solving process is a CS Unplugged activity. However, CS Unplugged has a disadvantage in that it only learns the principles of computing, and the learner cannot experience real problem solving. In this study, a learning program using artificial intelligence robots was developed with the goal of cultivating the ability to solve problems encountered in the real life of elementary school students. Students could solve complex problems in real life from the point of view of artificial intelligence through the developed program, and increase their interest and understanding of artificial intelligence education through robot control.

Analysis and Design of Cattle Management System based on IoT (사물인터넷 기반 소관리 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.125-130
    • /
    • 2021
  • Implementation of livestock smart-farm can be done more effectively with IoT technology developing. An build of useful stock management system can be possibile if push messages of these judgement are notified on smart-phone after cattle's illness and estrus are judged using IoT technology. These judgement method of cattle's illness and estrus can be done with gathering living stock data using temperature sensor and 3 axis acceleration sensor and sending these data using IoT and internet network into server, and studying AI machine learning using these data. In this paper, to build this cattle management system based on IoT, effective system of the whole architecture is showed. Also an effective analysis and design method to develop this system software will be presented by showing user requirement analysis using object-oriented method, flowchart and screen design.

The AI Promotion Strategy of Korea Defense for the AI Expansion in Defense Domain (국방분야 인공지능 저변화를 위한 대한민국 국방 인공지능 추진전략)

  • Lee, Seung-Mok;Kim, Young-Gon;An, Kyung-Soo
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.59-73
    • /
    • 2021
  • Recently, artificial intelligence has spread rapidly and popularized and expanded to the voice recognition personal service sector, and major countries have established artificial intelligence promotion strategies, but in the case of South Korea's defense domain, its influence is low with a geopolitical location with North Korea. This paper presents a total of six strategies for promoting South Korea's defense artificial intelligence, including establishing roadmaps, securing manpower, installing the artificial intelligence base, and strengthening cooperation among stakeholders in order to increase the impact of South Korea's defense artificial intelligence and successfully promote artificial intelligence. These suggestions are expected to establish the foundation for expanding the base of artificial intelligence.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

Real2Animation: A Study on the application of deepfake technology to support animation production (Real2Animation:애니메이션 제작지원을 위한 딥페이크 기술 활용 연구)

  • Dongju Shin;Bongjun Choi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.173-178
    • /
    • 2022
  • Recently, various computing technologies such as artificial intelligence, big data, and IoT are developing. In particular, artificial intelligence-based deepfake technology is being used in various fields such as the content and medical industry. Deepfake technology is a combination of deep learning and fake, and is a technology that synthesizes a person's face or body through deep learning, which is a core technology of AI, to imitate accents and voices. This paper uses deepfake technology to study the creation of virtual characters through the synthesis of animation models and real person photos. Through this, it is possible to minimize various cost losses occurring in the animation production process and support writers' work. In addition, as deepfake open source spreads on the Internet, many problems emerge, and crimes that abuse deepfake technology are prevalent. Through this study, we propose a new perspective on this technology by applying the deepfake technology to children's material rather than adult material.

Expansion of Product Liability : Applicability of SW and AI (제조물책임 범위의 확장 : SW와 AI의 적용가능성)

  • KIM, Yun-Myung
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.67-88
    • /
    • 2023
  • The expansion of the scope of product liability is necessary because the industrial environment has changed following the enactment of the Product Liability Act. Unlike human-coded algorithms, artificial intelligence is black-boxed according to machine learning, and even developers cannot explain the results. In particular, since the cause of the problem by artificial intelligence is unknown, the responsibility is unclear, and compensation for victims is not easy. This is because software or artificial intelligence is a non-object, and its productivity is not recognized under the Product Liability Act, which is limited to movable property. As a desperate measure, productivity may be recognized if it is stored or embedded in the medium. However, it is not reasonable to apply differently depending on the medium. The EU revise the product liability guidelines that recognize product liability when artificial intelligence is included. Although compensation for victims is the value pursued by the Product Liability Act, the essence has been overlooked by focusing on productivity. Even if an accident occurs using an artificial intelligence-adopted service, however, it is desirable to present standards according to practical risks instead of unconditionally holding product responsibility.

Study of Load Balancing Technique Based on Step-By-Step Weight Considering Server Status in SDN Environment (SDN 환경에서 서버 상태를 고려한 단계적 가중치 기반의 부하 분산 기법 연구)

  • Jae-Young Lee;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1087-1094
    • /
    • 2023
  • Due to the development of technologies, such as big data, cloud, IoT, and AI, The high data throughput is required, and the importance of network flexibility and scalability is increasing. However, existing network systems are dependent on vendors and equipment, and thus have limitations in meeting the foregoing needs. Accordingly, SDN technology that can configure a software-centered flexible network is attracting attention. In particular, a load balancing method based on SDN can efficiently process massive traffic and optimize network performance. In the existing load balancing studies in SDN environment have limitation in that unnecessary traffic occurs between servers and controllers or performing load balancing only after the server reaches an overload state. In order to solve this problem, this paper proposes a method that minimizes unnecessary traffic and appropriate load balancing can be performed before the server becomes overloaded through a method of assigning weights to servers in stages according to server load.