• Title/Summary/Keyword: Cyber intelligence

Search Result 247, Processing Time 0.021 seconds

Enhanced ACGAN based on Progressive Step Training and Weight Transfer

  • Jinmo Byeon;Inshil Doh;Dana Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Among the generative models in Artificial Intelligence (AI), especially Generative Adversarial Network (GAN) has been successful in various applications such as image processing, density estimation, and style transfer. While the GAN models including Conditional GAN (CGAN), CycleGAN, BigGAN, have been extended and improved, researchers face challenges in real-world applications in specific domains such as disaster simulation, healthcare, and urban planning due to data scarcity and unstable learning causing Image distortion. This paper proposes a new progressive learning methodology called Progressive Step Training (PST) based on the Auxiliary Classifier GAN (ACGAN) that discriminates class labels, leveraging the progressive learning approach of the Progressive Growing of GAN (PGGAN). The PST model achieves 70.82% faster stabilization, 51.3% lower standard deviation, stable convergence of loss values in the later high resolution stages, and a 94.6% faster loss reduction compared to conventional methods.

Comparison of Performance Between Incremental and Batch Learning Method for Information Analysis of Cyber Surveillance and Reconnaissance (사이버 감시정찰의 정보 분석에 적용되는 점진적 학습 방법과 일괄 학습 방법의 성능 비교)

  • Shin, Gyeong-Il;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.99-106
    • /
    • 2018
  • In the process of acquiring information through the cyber ISR (Intelligence Surveillance Reconnaissance) and research into the agent to help decision-making, periodic communication between the C&C (Command and Control) server and the agent may not be possible. In this case, we have studied how to effectively surveillance and reconnaissance. Due to the network configuration, agents planted on infiltrated computers can not communicate seamlessly with C&C servers. In this case, the agent continues to collect data continuously, and in order to analyze the collected data within a short time in When communication is possible with the C&C server, it can utilize limited resources and time to continue its mission without being discovered. This research shows the superiority of incremental learning method over batch method through experiments. At an experiment with the restricted memory of 500 mega bytes, incremental learning method shows 10 times decrease in learning time. But at an experiment with the reuse of incorrectly classified data, the required time for relearn takes twice more.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Smart E-Learning using Intelligence (지능을 이용한 스마트 이러닝)

  • Hong, YouSik;Kang, JeongJin;Lee, YoungDae;Kim, Chunshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.133-139
    • /
    • 2008
  • Cyber university can easily study the lecture only press the couple of mouse click or keyboard button anywhere and anytime, if you have a computer. Many people believe that virtual university can save time and improve learning. To check How many students learn which selected some of the virtual university courses, instructor must know how to the understanding students and find out their difficult problems. Without checking this condition, it will be a very difficult and boring virtual university course. In this paper, we introduce the intelligent learning system. It has a full duplex direction that teaches understanding students and not understanding students. The computer simulation results confirmed that a full duplex virtual learning system has been proven to be much more efficient than one way direction which unfortunately does not consider to understanding problems.

  • PDF

Pedestrian recognition using differential Haar-like feature based on Adaboost algorithm to apply intelligence wheelchair (지능형 휠체어 적용을 위해 Haar-like의 기울기 특징을 이용한 아다부스트 알고리즘 기반의 보행자 인식)

  • Lee, Sang-Hun;Park, Sang-Hee;Lee, Yeung-Hak;Seo, Hee-Don
    • Journal of Biomedical Engineering Research
    • /
    • v.31 no.6
    • /
    • pp.481-486
    • /
    • 2010
  • In this paper, we suggest an advanced algorithm, to recognize pedestrian/non-pedestrian using differential haar-like feature, which applies Adaboost algorithm to make a strong classification from weak classifications. First, we extract two feature vectors: horizontal haar-like feature and vertical haar-like feature. For the next, we calculate the proposed feature vector using differential haar-like method. And then, a strong classification needs to be obtained from weak classifications for composite recognition method using the differential area of horizontal and vertical haar-like. In the proposed method, we use one feature vector and one strong classification for the first stage of recognition. Based on our experiment, the proposed algorithm shows higher recognition rate compared to the traditional method for the pedestrian and non-pedestrian.

Effects of Character Strengths on Psychological Characteristics and Work Ethics of Hanwoo Managers: Gyeongnam and Gyeongbuk Areas (성격 강점이 한우경영인들의 심리특성과 직업의식에 미치는 영향: 경남과 경북지역을 중심으로)

  • Baek, Yu-Mi;Choi, In-Hag
    • Journal of Environmental Science International
    • /
    • v.22 no.6
    • /
    • pp.779-785
    • /
    • 2013
  • To examine the psychological characteristics and work ethics of Hanwoo managers, we selected 26 of the 50 managers who took part in this study to avoid unreliable response and non-description from the questionnaire. The core results of this study were the following: First, cronbach's ${\alpha}$ reliability with highest domain in this study were obtained from character strengths (.938), followed by job satisfaction (.841), internal evaluation (.799), and external evaluation (.739). Second, for perception and attitude of Hanwoo management, the correlation between job satisfaction and internal evaluation (P<0.05) was observed. Management satisfaction showed higher for intermediate group and subgroup and lower satisfaction for the top group. Third, there were statistical differences (P<0.05) in ten character strengths (curiosity, judgment, creativity, social intelligence, wisdom, honesty, optimism, responsibility, humor, and passion) according to group satisfaction. Ten character strengths were lower in creativity (7.14) and higher in responsibility (8.57) in comparison with other items for the top group. In conclusion, these results suggest that character strengths are beneficial to improve Hanwoo management on psychological characteristics and work ethics of managers.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

A Study on the System for Controlling Factory Safety based on Unity 3D (Unity 3D 기반 깊이 영상을 활용한 공장 안전 제어 시스템에 대한 연구)

  • Jo, Seonghyeon;Jung, Inho;Ko, Dongbeom;Park, Jeongmin
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.85-94
    • /
    • 2020
  • AI-based smart factory technologies are only increase short-term productivity. To solve this problem, collaborative intelligence combines human teamwork, creativity, AI speed, and accuracy to actively compensate for each other's shortcomings. However, current automation equipmens require high safety measures due to the high disaster intensity in the event of an accident. In this paper, we design and implement a factory safety control system that uses a depth camera to implement workers and facilities in the virtual world and to determine the safety of workers through simulation.

Gerontological Nursing in the Era of the Fourth Industrial Revolution (4차 산업혁명시대 노인 간호)

  • Tak, Sunghee H
    • Journal of Korean Gerontological Nursing
    • /
    • v.20 no.sup1
    • /
    • pp.160-165
    • /
    • 2018
  • Purpose: There is a need to examine changes in the health care environment and the impact on gerontological nursing care in the era of the Fourth Industrial Revolution. In this article recent healthcare paradigm changes, gerontechnology, high tech and high touch, person-centered approaches are discussed. Methods: A narrative review was used. Results: Cyber physical system, artificial intelligence, advance and convergence of bioengineering, and information communication technology are changing the health care paradigm to "precision", "prediction" and "personalization". Entry into the global aging society and the surge in the elderly population worldwide has led to searches for a new means to prepare for projected demands of this growing population. Thus, efforts such as gerontechnology have been made to apply and utilize recent innovative science and technology in order to promote the health and life of elders. There is a great emphasis on the convergence of high tech and high touch, in which humanistic and artistic approach are critical in order to assure that technology is beneficial to human beings rather than harmful. Conclusion: Positive healthcare experiences among patients and their families are emphasized by utilizing new technology and employing high touch while providing personalized care with a person-centered approach.