• Title/Summary/Keyword: AI Software

Search Result 540, Processing Time 0.027 seconds

Expansion of Product Liability : Applicability of SW and AI (제조물책임 범위의 확장 : SW와 AI의 적용가능성)

  • KIM, Yun-Myung
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.67-88
    • /
    • 2023
  • The expansion of the scope of product liability is necessary because the industrial environment has changed following the enactment of the Product Liability Act. Unlike human-coded algorithms, artificial intelligence is black-boxed according to machine learning, and even developers cannot explain the results. In particular, since the cause of the problem by artificial intelligence is unknown, the responsibility is unclear, and compensation for victims is not easy. This is because software or artificial intelligence is a non-object, and its productivity is not recognized under the Product Liability Act, which is limited to movable property. As a desperate measure, productivity may be recognized if it is stored or embedded in the medium. However, it is not reasonable to apply differently depending on the medium. The EU revise the product liability guidelines that recognize product liability when artificial intelligence is included. Although compensation for victims is the value pursued by the Product Liability Act, the essence has been overlooked by focusing on productivity. Even if an accident occurs using an artificial intelligence-adopted service, however, it is desirable to present standards according to practical risks instead of unconditionally holding product responsibility.

Study of Load Balancing Technique Based on Step-By-Step Weight Considering Server Status in SDN Environment (SDN 환경에서 서버 상태를 고려한 단계적 가중치 기반의 부하 분산 기법 연구)

  • Jae-Young Lee;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1087-1094
    • /
    • 2023
  • Due to the development of technologies, such as big data, cloud, IoT, and AI, The high data throughput is required, and the importance of network flexibility and scalability is increasing. However, existing network systems are dependent on vendors and equipment, and thus have limitations in meeting the foregoing needs. Accordingly, SDN technology that can configure a software-centered flexible network is attracting attention. In particular, a load balancing method based on SDN can efficiently process massive traffic and optimize network performance. In the existing load balancing studies in SDN environment have limitation in that unnecessary traffic occurs between servers and controllers or performing load balancing only after the server reaches an overload state. In order to solve this problem, this paper proposes a method that minimizes unnecessary traffic and appropriate load balancing can be performed before the server becomes overloaded through a method of assigning weights to servers in stages according to server load.

Enhanced ACGAN based on Progressive Step Training and Weight Transfer

  • Jinmo Byeon;Inshil Doh;Dana Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Among the generative models in Artificial Intelligence (AI), especially Generative Adversarial Network (GAN) has been successful in various applications such as image processing, density estimation, and style transfer. While the GAN models including Conditional GAN (CGAN), CycleGAN, BigGAN, have been extended and improved, researchers face challenges in real-world applications in specific domains such as disaster simulation, healthcare, and urban planning due to data scarcity and unstable learning causing Image distortion. This paper proposes a new progressive learning methodology called Progressive Step Training (PST) based on the Auxiliary Classifier GAN (ACGAN) that discriminates class labels, leveraging the progressive learning approach of the Progressive Growing of GAN (PGGAN). The PST model achieves 70.82% faster stabilization, 51.3% lower standard deviation, stable convergence of loss values in the later high resolution stages, and a 94.6% faster loss reduction compared to conventional methods.

Edutech in the Era of the 4th Industrial Revolution (4차 산업혁명 시대의 에듀테크)

  • Park, Ji Su;Gil, Joon-Min
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.329-331
    • /
    • 2020
  • Edutech is a compound word of education and technology, and is an educational paradigm in the era of the 4th industrial revolution. This refers to next-generation education using information and communication technology (ICT) such as big data, artificial intelligence (AI), robots, and virtual reality (VR) of the 4th industrial revolution. e-Learning is being used as an online lecture for education in ICT, but edutech is attracting attention along with e-learning as the feeding of non-face-to-face education has rapidly increased due to COVID-19. Therefore, this paper summarizes the reviewed papers on the blockchain-based badge service platform, simulation-based collaborative e-Learning system, video English dictionary, and blockchain-based access control audit system.

Case study of property extraction and utilization model for the game player models (게임 플레이어 모델을 위한 속성 추출과 모델 활용 사례)

  • Yoon, Taebok;Yang, Seong-Il
    • Journal of Korea Game Society
    • /
    • v.21 no.6
    • /
    • pp.87-96
    • /
    • 2021
  • As the industry develops, the technology used for games is also being advanced. In particular, AI technology is used to game automation and intelligence. These game player patterns are widely used in online games such as player matchmaking, generation of friendly or hostile NPCs, and balancing of game worlds. This study proposes a model generation method for game players. For model generation, attributes such as hunting, collection, movement, combat, crisis management, production, and interaction were defined, and patterns were extracted and modeled using decision tree method. To evaluate the proposed method, we used the game log of a commercial game and confirmed the meaningful results.

A Study on Email Security through Proactive Detection and Prevention of Malware Email Attacks (악성 이메일 공격의 사전 탐지 및 차단을 통한 이메일 보안에 관한 연구)

  • Yoo, Ji-Hyun
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.672-678
    • /
    • 2021
  • New malware continues to increase and become advanced by every year. Although various studies are going on executable files to diagnose malicious codes, it is difficult to detect attacks that internalize malicious code threats in emails by exploiting non-executable document files, malicious URLs, and malicious macros and JS in documents. In this paper, we introduce a method of analyzing malicious code for email security through proactive detection and blocking of malicious email attacks, and propose a method for determining whether a non-executable document file is malicious based on AI. Among various algorithms, an efficient machine learning modeling is choosed, and an ML workflow system to diagnose malicious code using Kubeflow is proposed.

Development of Multi-Sensor Convergence Monitoring and Diagnosis Device based on Edge AI for the Modular Main Circuit Breaker of Korean High-Speed Rolling Stock

  • Byeong Ju, Yun;Jhong Il, Kim;Jae Young, Yoon;Jeong Jin, Kang;You Sik, Hong
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.569-575
    • /
    • 2022
  • This is a research thesis on the development of a monitoring and diagnosis device that prevents the risk of an accident through monitoring and diagnosis of a modular Main Circuit Breaker (MCB) using Vacuum Interrupter (VI) for Korean high-speed rolling stock. In this paper, a comprehensive MCB monitoring and diagnosis was performed by converging vacuum level diagnosis of interrupter, operating coil monitoring of MCB and environmental temperature/humidity monitoring of modular box. In addition, to develop an algorithm that is expected to have a similar data processing before the actual field test of the MCB monitoring and diagnosis device in 2023, the cluster analysis and factor analysis were performed using the WEKA data mining technique on the big data of Korean railroad transformer, which was previously researched by Tae Hee Evolution with KORAIL.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

Marketability analysis and commercialization methodology analysis system using big dataof Digital Policy & Management (빅데이터를 활용한 시장분석 및 사업화방법론 분석시스템)

  • Yong-Ho Kim;Hyung-Beom Park
    • Journal of Digital Convergence
    • /
    • v.21 no.2
    • /
    • pp.27-32
    • /
    • 2023
  • This study is about a marketability analysis and commercialization methodology analysis system using big data, and a marketability analysis and commercialization methodology analysis system that can analyze the marketability of the product based on a content channel capable of viral marketing. The marketability analysis and commercialization methodology analysis system using big data according to this study analyzes the marketability of the products to be analyzed by analyzing the marketing content provided on the content channel, so it has the advantage of determining more accurate viral marketing effects on the products to be analyzed.

YOLO models based Bounding-Box Ensemble Method for Patient Detection In Homecare Place Images (조호환경 내 환자 탐지를 위한 YOLO 모델 기반 바운딩 박스 앙상블 기법)

  • Park, Junhwi;Kim, Beomjun;Kim, Inki;Gwak, Jeonghwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.562-564
    • /
    • 2022
  • 조호환경이란 환자의 지속적인 추적 및 관찰이 필요한 환경으로써, 병원 입원실, 요양원 등을 의미한다. 조호환경 내 환자의 이상 증세가 발생하는 시간 및 이상 증세의 종류는 예측할 수 없기에 인력을 통한 상시 관리는 필수적이다. 또한, 환자의 이상 증세 발견 시간은 발병 시점부터의 소요 시간이 생사와 즉결되기에 빠른 발견이 매우 중요하다. 하지만, 인력을 통한 상시 관리는 많은 경제적 비용을 수반하기에 독거 노인, 빈민층 등 요양 비용을 충당하지 못하는 환자들이 수혜받는 것은 어려우며, 인력을 통해 이루어지기 때문에 이상 증세 발병 즉시 발견에 한계를 가진다. 즉, 기존까지 조호환경 내 환자 관리 방식은 경제적 비용과 이상 증세 발병 즉시 발견에 한계를 가진다는 문제점을 가진다. 따라서 본 논문은 YOLO 모델의 조호환경 내 환자 탐지 성능 비교 및 바운딩 박스 앙상블 기법을 제안한다. 이를 통해, 딥러닝 모델을 통한 환자 상시 관리가 이루어지기에 높은 경제적 비용문제를 해소할 수 있다. 또한, YOLO 모델 바운딩 박스 앙상블 기법 WBF를 통해 폐색이 짙은 조호환경 영상 데이터 내에 객체 탐지 영역 정확도 향상 방법을 연구하였다.