• Title/Summary/Keyword: Central Science Technology Intelligence

Search Result 18, Processing Time 0.022 seconds

The Information System of Science Technology and the Infrastructure of Information Technology in North Korea (북한의 정보화 기반과 과학기술정보시스템)

  • 송승섭
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.1
    • /
    • pp.99-120
    • /
    • 2002
  • This study is to firstly investigate information infrastructure in North Korea such as communication network, hardware, software and etc, and then, based on it, to grasp the present condition of information technology in libraries there. Also, it is to analyze the information system of science technology in order to research the circulation system of science information with focusing on the Central Science Technology Intelligence (CSTI), a representative intelligence agency for science technology in North Korea, and on the retrieval program of “KWANGMYOUNG System”developed by CSTI and used broadly.

  • PDF

Keyword Network Analysis and Topic Modeling of News Articles Related to Artificial Intelligence and Nursing (인공지능과 간호에 관한 언론보도 기사의 키워드 네트워크 분석 및 토픽 모델링)

  • Ha, Ju-Young;Park, Hyo-Jin
    • Journal of Korean Academy of Nursing
    • /
    • v.53 no.1
    • /
    • pp.55-68
    • /
    • 2023
  • Purpose: The purpose of this study was to identify the main keywords, network properties, and main topics of news articles related to artificial intelligence technology in the field of nursing. Methods: After collecting artificial intelligence-and nursing-related news articles published between January 1, 1991, and July 24, 2022, keywords were extracted via preprocessing. A total of 3,267 articles were searched, and 2,996 were used for the final analysis. Text network analysis and topic modeling were performed using NetMiner 4.4. Results: As a result of analyzing the frequency of appearance, the keywords used most frequently were education, medical robot, telecom, dementia, and the older adults living alone. Keyword network analysis revealed the following results: a density of 0.002, an average degree of 8.79, and an average distance of 2.43; the central keywords identified were 'education,' 'medical robot,' and 'fourth industry.' Five topics were derived from news articles related to artificial intelligence and nursing: 'Artificial intelligence nursing research and development in the health and medical field,' 'Education using artificial intelligence for children and youth care,' 'Nursing robot for older adults care,' 'Community care policy and artificial intelligence,' and 'Smart care technology in an aging society.' Conclusion: The use of artificial intelligence may be helpful among the local community, older adult, children, and adolescents. In particular, health management using artificial intelligence is indispensable now that we are facing a super-aging society. In the future, studies on nursing intervention and development of nursing programs using artificial intelligence should be conducted.

A Reinforcement Learning Framework for Autonomous Cell Activation and Customized Energy-Efficient Resource Allocation in C-RANs

  • Sun, Guolin;Boateng, Gordon Owusu;Huang, Hu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3821-3841
    • /
    • 2019
  • Cloud radio access networks (C-RANs) have been regarded in recent times as a promising concept in future 5G technologies where all DSP processors are moved into a central base band unit (BBU) pool in the cloud, and distributed remote radio heads (RRHs) compress and forward received radio signals from mobile users to the BBUs through radio links. In such dynamic environment, automatic decision-making approaches, such as artificial intelligence based deep reinforcement learning (DRL), become imperative in designing new solutions. In this paper, we propose a generic framework of autonomous cell activation and customized physical resource allocation schemes for energy consumption and QoS optimization in wireless networks. We formulate the problem as fractional power control with bandwidth adaptation and full power control and bandwidth allocation models and set up a Q-learning model to satisfy the QoS requirements of users and to achieve low energy consumption with the minimum number of active RRHs under varying traffic demand and network densities. Extensive simulations are conducted to show the effectiveness of our proposed solution compared to existing schemes.

A hybrid deep neural network compression approach enabling edge intelligence for data anomaly detection in smart structural health monitoring systems

  • Tarutal Ghosh Mondal;Jau-Yu Chou;Yuguang Fu;Jianxiao Mao
    • Smart Structures and Systems
    • /
    • v.32 no.3
    • /
    • pp.179-193
    • /
    • 2023
  • This study explores an alternative to the existing centralized process for data anomaly detection in modern Internet of Things (IoT)-based structural health monitoring (SHM) systems. An edge intelligence framework is proposed for the early detection and classification of various data anomalies facilitating quality enhancement of acquired data before transmitting to a central system. State-of-the-art deep neural network pruning techniques are investigated and compared aiming to significantly reduce the network size so that it can run efficiently on resource-constrained edge devices such as wireless smart sensors. Further, depthwise separable convolution (DSC) is invoked, the integration of which with advanced structural pruning methods exhibited superior compression capability. Last but not least, quantization-aware training (QAT) is adopted for faster processing and lower memory and power consumption. The proposed edge intelligence framework will eventually lead to reduced network overload and latency. This will enable intelligent self-adaptation strategies to be employed to timely deal with a faulty sensor, minimizing the wasteful use of power, memory, and other resources in wireless smart sensors, increasing efficiency, and reducing maintenance costs for modern smart SHM systems. This study presents a theoretical foundation for the proposed framework, the validation of which through actual field trials is a scope for future work.

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

Development of artificial intelligence-based river flood level prediction model capable of independent self-warning (독립적 자체경보가 가능한 인공지능기반 하천홍수위예측 모형개발)

  • Kim, Sooyoung;Kim, Hyung-Jun;Yoon, Kwang Seok
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.12
    • /
    • pp.1285-1294
    • /
    • 2021
  • In recent years, as rainfall is concentrated and rainfall intensity increases worldwide due to climate change, the scale of flood damage is increasing. Rainfall of a previously unobserved magnitude falls, and the rainy season lasts for a long time on record. In particular, these damages are concentrated in ASEAN countries, and at least 20 million people among ASEAN countries are affected by frequent flooding due to recent sea level rise, typhoons and torrential rain. Korea supports the domestic flood warning system to ASEAN countries through various ODA projects, but the communication network is unstable, so there is a limit to the central control method alone. Therefore, in this study, an artificial intelligence-based flood prediction model was developed to develop an observation station that can observe water level and rainfall, and even predict and warn floods at once at one observation station. Training, validation and testing were carried out for 0.5, 1, 2, 3, and 6 hours of lead time using the rainfall and water level observation data in 10-minute units from 2009 to 2020 at Junjukbi-bridge station of Seolma stream. LSTM was applied to artificial intelligence algorithm. As a result of the study, it showed excellent results in model fit and error for all lead time. In the case of a short arrival time due to a small watershed and a large watershed slope such as Seolma stream, a lead time of 1 hour will show very good prediction results. In addition, it is expected that a longer lead time is possible depending on the size and slope of the watershed.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

Evaluating the bond strength of FRP in concrete samples using machine learning methods

  • Gao, Juncheng;Koopialipoor, Mohammadreza;Armaghani, Danial Jahed;Ghabussi, Aria;Baharom, Shahrizan;Morasaei, Armin;Shariati, Ali;Khorami, Majid;Zhou, Jian
    • Smart Structures and Systems
    • /
    • v.26 no.4
    • /
    • pp.403-418
    • /
    • 2020
  • In recent years, the use of Fiber Reinforced Polymers (FRPs) as one of the most common ways to increase the strength of concrete samples, has been introduced. Evaluation of the final strength of these specimens is performed with different experimental methods. In this research, due to the variety of models, the low accuracy and impact of different parameters, the use of new intelligence methods is considered. Therefore, using artificial intelligent-based models, a new solution for evaluating the bond strength of FRP is presented in this paper. 150 experimental samples were collected from previous studies, and then two new hybrid models of Imperialist Competitive Algorithm (ICA)-Artificial Neural Network (ANN) and Artificial Bee Colony (ABC)-ANN were developed. These models were evaluated using different performance indices and then, a comparison was made between the developed models. The results showed that the ICA-ANN model's ability to predict the bond strength of FRP is higher than the ABC-ANN model. Finally, to demonstrate the capabilities of this new model, a comparison was made between the five experimental models and the results were presented for all data. This comparison showed that the new model could offer better performance. It is concluded that the proposed hybrid models can be utilized in the field of this study as a suitable substitute for empirical models.

Comparison of Artificial Neural Networks for Low-Power ECG-Classification System

  • Rana, Amrita;Kim, Kyung Ki
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.1
    • /
    • pp.19-26
    • /
    • 2020
  • Electrocardiogram (ECG) classification has become an essential task of modern day wearable devices, and can be used to detect cardiovascular diseases. State-of-the-art Artificial Intelligence (AI)-based ECG classifiers have been designed using various artificial neural networks (ANNs). Despite their high accuracy, ANNs require significant computational resources and power. Herein, three different ANNs have been compared: multilayer perceptron (MLP), convolutional neural network (CNN), and spiking neural network (SNN) only for the ECG classification. The ANN model has been developed in Python and Theano, trained on a central processing unit (CPU) platform, and deployed on a PYNQ-Z2 FPGA board to validate the model using a Jupyter notebook. Meanwhile, the hardware accelerator is designed with Overlay, which is a hardware library on PYNQ. For classification, the MIT-BIH dataset obtained from the Physionet library is used. The resulting ANN system can accurately classify four ECG types: normal, atrial premature contraction, left bundle branch block, and premature ventricular contraction. The performance of the ECG classifier models is evaluated based on accuracy and power. Among the three AI algorithms, the SNN requires the lowest power consumption of 0.226 W on-chip, followed by MLP (1.677 W), and CNN (2.266 W). However, the highest accuracy is achieved by the CNN (95%), followed by MLP (76%) and SNN (90%).

A Study on the Improvement of Information Security Management Condition Evaluation in Public Sector through the SCAP Analysis by NIST in U.S. (미(美) NIST 보안성 자동평가프로토콜(SCAP)분석을 통한 공공기관의 정보보안관리실태 평가제도 개선방안 연구)

  • Jee, Yoon Seok;Lee, Yong Suk;Yoon, Duck Jung;Shin, Yong Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.4
    • /
    • pp.31-39
    • /
    • 2019
  • The 129 public institutions in Korea are subject to Information Security Management Condition Evaluation (ISMCE) as a part of the government management evaluation system by the Ministry of Economy and Finance. ISMCE is started in 2006 with the central government institutions, and applied to the all public institutions in 2009. This evaluation is annually conducted by the National Intelligence Service through the site visits, and the number of the evaluated institutions is increasing year by year. However, the process of ISMCE - identifying existing vulnerabilities in the information system - is conducted manually. To improve this inconvenience, this paper introduces the various evaluation system in the major countries, especially in the United States, and analyzes the Security Content Automation Protocol (SCAP) by NIST. SCAP is automation protocol for the system vulnerability management (in technical fields) and security policy compliance evaluation. Based on SCAP, this paper suggests an improvement plan for the ISMCE of Korea.