• Title/Summary/Keyword: Artificial Intelligence (AI)

Search Result 2,070, Processing Time 0.024 seconds

A Study on the Strategic Application of National Defense Data for the Construction of Smart Forces in the 4th IR (4차 산업혁명시대 스마트 강군 건설을 위한 국방 데이터의 전략적 활용 방안연구)

  • Kim, Seyong;Kim, Junsang;Kang, Seokwon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.113-123
    • /
    • 2020
  • The fourth industrial revolution can be called the hyper-connected-based intelligent revolution triggered by advanced information technology and intelligent technology, and the basis for implementing these technologies is 'data'. This study proposes a way to strategically use data in order to lead this intelligent revolution in the defense area. First of all, implications through analysis of domestic and international trends and prior research and current status of defense data management were analyzed, and four directions for development were presented. If the government composes conditions for building, releasing, sharing, distribution, and convergence of defense data considering the environment of national defense in the future, it is expected that it will serve as a foundation and a shortcut to be a digitalized strong military through smart defense innovation in the era of the fourth industrial revolution.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

Risk Prediction Model of Legal Contract Based on Korean Machine Reading Comprehension (한국어 기계독해 기반 법률계약서 리스크 예측 모델)

  • Lee, Chi Hoon;Woo, Noh Ji;Jeong, Jae Hoon;Joo, Kyung Sik;Lee, Dong Hee
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.131-143
    • /
    • 2021
  • Commercial transactions, one of the pillars of the capitalist economy, are occurring countless times every day, especially small and medium-sized businesses. However, small and medium-sized enterprises are bound to be the legal underdogs in contracts for commercial transactions and do not receive legal support for contracts for fair and legitimate commercial transactions. When subcontracting contracts are concluded among small and medium-sized enterprises, 58.2% of them do not apply standard contracts and sign contracts that have not undergone legal review. In order to support small and medium-sized enterprises' fair and legitimate contracts, small and medium-sized enterprises can be protected from legal threats if they can reduce the risk of signing contracts by analyzing various risks in the contract and analyzing and informing them of toxic clauses and omitted contracts in advance. We propose a risk prediction model for the machine reading-based legal contract to minimize legal damage to small and medium-sized business owners in the legal blind spots. We have established our own set of legal questions and answers based on the legal data disclosed for the purpose of building a model specialized in legal contracts. Quantitative verification was carried out through indicators such as EM and F1 Score by applying pine tuning and hostile learning to pre-learned machine reading models. The highest F1 score was 87.93, with an EM value of 72.41.

Research on Deep Learning Performance Improvement for Similar Image Classification (유사 이미지 분류를 위한 딥 러닝 성능 향상 기법 연구)

  • Lim, Dong-Jin;Kim, Taehong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.1-9
    • /
    • 2021
  • Deep learning in computer vision has made accelerated improvement over a short period but large-scale learning data and computing power are still essential that required time-consuming trial and error tasks are involved to derive an optimal network model. In this study, we propose a similar image classification performance improvement method based on CR (Confusion Rate) that considers only the characteristics of the data itself regardless of network optimization or data reinforcement. The proposed method is a technique that improves the performance of the deep learning model by calculating the CRs for images in a dataset with similar characteristics and reflecting it in the weight of the Loss Function. Also, the CR-based recognition method is advantageous for image identification with high similarity because it enables image recognition in consideration of similarity between classes. As a result of applying the proposed method to the Resnet18 model, it showed a performance improvement of 0.22% in HanDB and 3.38% in Animal-10N. The proposed method is expected to be the basis for artificial intelligence research using noisy labeled data accompanying large-scale learning data.

Development of Wire/Wireless Communication Modules using Environmental Sensor Modules for LNG Storage Tanks (LNG 저장탱크용 환경 센서 모듈을 이용한 유무선 통신 모듈 개발)

  • Park, Byong Jin;Kim, Min Sung
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • Accidents are steadily occurring due to machine defects and carelessness during LNG storage operations. In previous studies, an environmental sensor module capable of measuring pressure, temperature, gas concentration, and flow to detect danger in advance was developed and the response speed according to the amount of leaked gas was measured. This paper proposes the development of a wired and wireless communication module that transmits data measured by the environmental sensor module to embedded devices connected to wired and wireless networks of SPI, UART, and LTE. First, a data communication module capable of interworking with an environmental sensor is designed. Design a protocol between devices in the Local Control Part and wired and wireless protocols in the Local Control Part and Remote Control Part. Ethernet, WiFi, and LTE communication modules were designed, and UART and SPI channels that can be linked with embedded controllers were designed. As a result, it was confirmed through a UI (User Interface) that each embedded device transmits data measured by the environmental sensor module while simultaneously communicating on a wired and wireless basis.

Research on Human Posture Recognition System Based on The Object Detection Dataset (객체 감지 데이터 셋 기반 인체 자세 인식시스템 연구)

  • Liu, Yan;Li, Lai-Cun;Lu, Jing-Xuan;Xu, Meng;Jeong, Yang-Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.111-118
    • /
    • 2022
  • In computer vision research, the two-dimensional human pose is a very extensive research direction, especially in pose tracking and behavior recognition, which has very important research significance. The acquisition of human pose targets, which is essentially the study of how to accurately identify human targets from pictures, is of great research significance and has been a hot research topic of great interest in recent years. Human pose recognition is used in artificial intelligence on the one hand and in daily life on the other. The excellent effect of pose recognition is mainly determined by the success rate and the accuracy of the recognition process, so it reflects the importance of human pose recognition in terms of recognition rate. In this human body gesture recognition, the human body is divided into 17 key points for labeling. Not only that but also the key points are segmented to ensure the accuracy of the labeling information. In the recognition design, use the comprehensive data set MS COCO for deep learning to design a neural network model to train a large number of samples, from simple step-by-step to efficient training, so that a good accuracy rate can be obtained.

An Enhancement Method of Document Restoration Capability using Encryption and DnCNN (암호화와 DnCNN을 활용한 문서 복원능력 향상에 관한 연구)

  • Jang, Hyun-Hee;Ha, Sung-Jae;Cho, Gi-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-84
    • /
    • 2022
  • This paper presents an enhancement method of document restoration capability which is robust for security, loss, and contamination, It is based on two methods, that is, encryption and DnCNN(DeNoise Convolution Neural Network). In order to implement this encryption method, a mathematical model is applied as a spatial frequency transfer function used in optics of 2D image information. Then a method is proposed with optical interference patterns as encryption using spatial frequency transfer functions and using mathematical variables of spatial frequency transfer functions as ciphers. In addition, by applying the DnCNN method which is bsed on deep learning technique, the restoration capability is enhanced by removing noise. With an experimental evaluation, with 65% information loss, by applying Pre-Training DnCNN Deep Learning, the peak signal-to-noise ratio (PSNR) shows 11% or more superior in compared to that of the spatial frequency transfer function only. In addition, it is confirmed that the characteristic of CC(Correlation Coefficient) is enhanced by 16% or more.

Prototypical Eye Shape Classification to Solve Life-and-Death Problem in Go, using Monte-Carlo Method and Point Pattern Matching (몬테카를로 방법과 점 패턴 매칭을 활용한 바둑에서의 사활문제 해결을 위한 원형 안형의 분류)

  • Lee, Byung-Doo
    • Journal of Korea Game Society
    • /
    • v.21 no.6
    • /
    • pp.31-40
    • /
    • 2021
  • Go has a history of more than 2,500 years, and the life-and-death problems in Go is a fundamental problem domain that must be solved when implementing a computer Go. We attempted to determine the numbers of prototypical eye shapes with 3, 4, 5, and 6 eyes that are directly related to the life-and-death problems, and to classify the prototypical eye shapes represented in 4-tuple forms. Experiment was conducted by Monte-Carlo method and point pattern matching. According to the experimental results, the numbers of prototypical eye shapes were 2 for 3-eye, 5 for 4-eye, 12 for 5-eye, and 35 for 6-eye shapes. Further, using a 4-tuple form, we classified prototypical eye shapes into 1 for 3-eye, 3 for 4-eye, 4 for 5-eye, and 8 for 6-eye shapes.

Study of Black Ice Detection Method through Color Image Analysis (컬러 이미지 분석을 통한 블랙 아이스 검출 방법 연구)

  • Park, Pill-Won;Han, Seong-Soo
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.90-96
    • /
    • 2021
  • Most of the vehicles currently under development and in operation are equipped with various IoT sensors, but some of the factors that cause car accidents are relatively difficult to detect. One of the major risk factors among these factors is black ice. Black ice is one of the factors most likely to cause major accidents, as it can affect all vehicles passing through areas covered with black ice. Therefore, black ice detection technique is essential to prevent major accidents. For this purpose, some studies have been carried out in the past, but unrealistic factors have been reflected in some parts, so research to supplement this is needed. In this paper, we tried to detect black ice by analyzing color images using the CNN technique, and we succeeded in detecting black ice to a certain level. However, there were differences from previous studies, and the reason was analyzed.

Development of SW-STEAM Education Program Using Monte Carlo Simulation: Focusing on Mendelian Inheritance (몬테카를로 시뮬레이션을 활용한 SW융합교육 프로그램 개발: 멘델의 유전 원리를 중심으로)

  • Kim, Bongchul;Yoo, Hyejin;Oh, Seungtak;Namgoong, Dongkook;Kim, Jonghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.2
    • /
    • pp.97-104
    • /
    • 2022
  • As the era of digital transformation begins in earnest, the importance of convergent thinking based on software, artificial intelligence, and big data is increasing. In line with these social needs, this study developed a 5th hour SW-STEAM education program using Monte Carlo simulation techniques for Mendelian inheritance in the field of life science. By programming and implementing Mendelian inheritance using Monte carlo simulation, the program was organized so that not only convergent thinking skills but also related knowledge could be understood in depth. In order to verify the validity of the developed education program, 11 experts in related fields were requested to test the content validity, and the validity was verified by meeting the CVR reference value of 0.59 suggested by Lawshe.