• Title/Summary/Keyword: Artificial intelligence capabilities

Search Result 127, Processing Time 0.022 seconds

Selection of Evaluation Metrics for Grading Autonomous Driving Car Judgment Abilities Based on Driving Simulator (드라이빙 시뮬레이터 기반 자율주행차 판단능력 등급화를 위한 평가지표 선정)

  • Oh, Min Jong;Jin, Eun Ju;Han, Mi Seon;Park, Je Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.1
    • /
    • pp.63-73
    • /
    • 2024
  • Autonomous vehicles at Levels 3 to 5, currently under global research and development, seek to replace the driver's perception, judgment, and control processes with various sensors integrated into the vehicle. This integration enables artificial intelligence to autonomously perform the majority of driving tasks. However, autonomous vehicles currently obtain temporary driving permits, allowing them to operate on roads if they meet minimum criteria for autonomous judgment abilities set by individual countries. When autonomous vehicles become more widespread in the future, it is anticipated that buyers may not have high confidence in the ability of these vehicles to avoid hazardous situations due to the limitations of temporary driving permits. In this study, we propose a method for grading the judgment abilities of autonomous vehicles based on a driving simulator experiment comparing and evaluating drivers' abilities to avoid hazardous situations. The goal is to derive evaluation criteria that allow for grading based on specific scenarios and to propose a framework for grading autonomous vehicles. Thirty adults (25 males and 5 females) participated in the driving simulator experiment. The analysis of the experimental results involved K-means cluster analysis and independent sample t-tests, confirming the possibility of classifying the judgment abilities of autonomous vehicles and the statistical significance of such classifications. Enhancing confidence in the risk-avoidance capabilities of autonomous vehicles in future hazardous situations could be a significant contribution of this research.

Development and mathematical performance analysis of custom GPTs-Based chatbots (GPTs 기반 문제해결 맞춤형 챗봇 제작 및 수학적 성능 분석)

  • Kwon, Misun
    • Education of Primary School Mathematics
    • /
    • v.27 no.3
    • /
    • pp.303-320
    • /
    • 2024
  • This study presents the development and performance evaluation of a custom GPT-based chatbot tailored to provide solutions following Polya's problem-solving stages. A beta version of the chatbot was initially deployed to assess its mathematical capabilities, followed by iterative error identification and correction, leading to the final version. The completed chatbot demonstrated an accuracy rate of approximately 89.0%, correctly solving an average of 57.8 out of 65 image-based problems from a 6th-grade elementary mathematics textbook, reflecting a 4 percentage point improvement over the beta version. For a subset of 50 problems, where images were not critical for problem resolution, the chatbot achieved an accuracy rate of approximately 91.0%, solving an average of 45.5 problems correctly. Predominant errors included problem recognition issues, particularly with complex or poorly recognizable images, along with concept confusion and comprehension errors. The custom chatbot exhibited superior mathematical performance compared to the general-purpose ChatGPT. Additionally, its solution process can be adapted to various grade levels, facilitating personalized student instruction. The ease of chatbot creation and customization underscores its potential for diverse applications in mathematics education, such as individualized teacher support and personalized student guidance.

The Impact of Social Capital and Laboratory Startup Team Diversity on Startup Performance Based on a Network Perspective: Focusing on the I-Corps Program (네트워크 관점에 기반한 사회적 자본 및 실험실 창업팀 다양성이창업 성과에 미치는 영향: I-Corps program을 중심으로)

  • Lee, Jai Ho;Sohn, Youngwoo;Han, Jung Wha;Lee, Sang-Myung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.173-189
    • /
    • 2023
  • As supreme technologies continue to be developed, industries such as artificial intelligence, biotechnology, robots, aerospace, electric vehicles, and solar energy are created, and the macro business environment is rapidly changing. Due to these large-scale changes and increased complexity, it is necessary to pay attention to the effect of social capital, which can create new value by utilizing capital increasing the importance of relationships rather than technology or asset ownership itself at the level of start-up strategy. Social capital is a concept first proposed by Hanifan in 1916, and refers to the overall sum of capabilities or resources that are latent or available for use in mutual, continuous, organic relationships or accumulated human relationship networks between individuals or social members. In addition, the diversity of start-up teams with diverse backgrounds, characteristics, and capabilities, rather than one exceptional founder, has been emphasized. Founding team diversity refers to the diversity of in-depth factors such as demographic factors, beliefs, and values of the founding team. In addition, changes in the macro environment are emphasizing the importance of technology start-ups and laboratory start-ups that lead industrial innovation and create the nation's core growth engines. This study focused on the I-Corps' program. I-Corps, which means innovation corps, is a laboratory startup program launched by the National Research Foundation (NSF) in 2011 to encourage entrepreneurship and commercialization of research results. It focuses on forming a startup team involving professors, researchers and market discovery activities. Taking these characteristics into account, this study empirically verified the impact of social capital from a network perspective and founding team diversity on I-Corps start-up performance. As a result of the analysis, the educational diversity of the founding team had a negative (-) effect on the financial performance of the founding team. On the other side, the gender diversity and the cognitive dimension of social capital had a positive (+) effect on the financial performance of the founding team. This study is expected to provide more useful theoretical and practical implications regarding the diversity, social capital, and performance interpretation of the I-Corps Lab startup team.

  • PDF

Risk Education and Educational Needs Related to Science and Technology: A Study on Science Teachers' Perceptions (중등 과학교사들이 생각하는 과학기술 관련 위험교육 실태와 교육 요구)

  • Jinhee Kim;Jiyeon Na;Yong Wook Cheong
    • Journal of The Korean Association For Science Education
    • /
    • v.44 no.1
    • /
    • pp.57-75
    • /
    • 2024
  • This study aimed to investigate the current state and educational needs of risk education related to science and technology as perceived by secondary science teachers. A survey was conducted with a total of 366 secondary science teachers. The results are as follows. First, There were more teachers who had not provided education on risks arising from science and technology in terms of risk perception, risk assessment, and risk management than those who had not. Global warming was the most common risk taught by teachers, followed by earthquakes, artificial intelligence, and traffic accidents. Second, teachers recognized that they lacked understanding that the achievement standards of the 2022 revised science curriculum include risks that may occur due to science and technology, but they thought they were prepared to teach. Third, teachers recognized that their understanding of risk perception was higher than that of risk management and risk assessment. Fourth, the experience of teachers in training on risk was very limited, with fewer having training in risk assessment and risk management compared to risk perception. The most common training experienced was in laboratory safety. Fifth, teachers recognized that their capabilities for the 10 goals of risk education were not high. Middle school teachers or teachers majoring in integrated science education evaluated their capabilities relatively highly. Sixth, many teachers thought it was important to address risks in school science education. They prioritized 'information use', 'decision-making skills', and 'influence of mass media', in that order, for importance and called for urgent education in 'action skills', 'information use', and 'influence of risk perception'. Seventh, as a result of deriving the priorities of education needs for each of the 10 goals of risk education, 'action skills', 'influence of risk perception', and 'evaluate risk assessment' were ranked 1st, 2nd, and 3rd, respectively.

Autopoietic Machinery and the Emergence of Third-Order Cybernetics (자기생산 기계 시스템과 3차 사이버네틱스의 등장)

  • Lee, Sungbum
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.277-312
    • /
    • 2018
  • First-order cybernetics during the 1940s and 1950s aimed for control of an observed system, while second-order cybernetics during the mid-1970s aspired to address the mechanism of an observing system. The former pursues an objective, subjectless, approach to a system, whereas the latter prefers a subjective, personal approach to a system. Second-order observation must be noted since a human observer is a living system that has its unique cognition. Maturana and Varela place the autopoiesis of this biological system at the core of second-order cybernetics. They contend that an autpoietic system maintains, transforms and produces itself. Technoscientific recreation of biological autopoiesis opens up to a new step in cybernetics: what I describe as third-order cybernetics. The formation of technoscientific autopoiesis overlaps with the Fourth Industrial Revolution or what Erik Brynjolfsson and Andrew McAfee call the Second Machine Age. It leads to a radical shift from human centrism to posthumanity whereby humanity is mechanized, and machinery is biologized. In two versions of the novel Demon Seed, American novelist Dean Koontz explores the significance of technoscientific autopoiesis. The 1973 version dramatizes two kinds of observers: the technophobic human observer and the technology-friendly machine observer Proteus. As the story concludes, the former dominates the latter with the result that an anthropocentric position still works. The 1997 version, however, reveals the victory of the techno-friendly narrator Proteus over the anthropocentric narrator. Losing his narrational position, the technophobic human narrator of the story disappears. In the 1997 version, Proteus becomes the subject of desire in luring divorcee Susan. He longs to flaunt his male egomaniac. His achievement of male identity is a sign of technological autopoiesis characteristic of third-order cybernetics. To display self-producing capabilities integral to the autonomy of machinery, Koontz's novel demonstrates that Proteus manipulates Susan's egg to produce a human-machine mixture. Koontz's demon child, problematically enough, implicates the future of eugenics in an era of technological autopoiesis. Proteus creates a crossbreed of humanity and machinery to engineer a perfect body and mind. He fixes incurable or intractable diseases through genetic modifications. Proteus transfers a vast amount of digital information to his offspring's brain, which enables the demon child to achieve state-of-the-art intelligence. His technological editing of human genes and consciousness leads to digital standardization through unanimous spread of the best qualities of humanity. He gathers distinguished human genes and mental status much like collecting luxury brands. Accordingly, Proteus's child-making project ultimately moves towards technologically-controlled eugenics. Pointedly, it disturbs the classical ideal of liberal humanism celebrating a human being as the master of his or her nature.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.