• Title/Summary/Keyword: Cyber intelligence

Search Result 247, Processing Time 0.021 seconds

Implementation of Real-time Recognition System for Continuous Korean Sign Language(KSL) mixed with Korean Manual Alphabet(KMA) (지문자를 포함한 연속된 한글 수화의 실시간 인식 시스템 구현)

  • Lee, Chan-Su;Kim, Jong-Sung;Park, Gyu-Tae;Jang, Won;Bien, Zeung-Nam
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.6
    • /
    • pp.76-87
    • /
    • 1998
  • This paper deals with a system which recognizes dynmic hand gestures, Korean Sign Language(KSL), mixed with static hand gesture, Korean Manual Alphabet(KMA), continuously. Recognition of continuous hand gestures is very difficult for lack of explicit tokens indicating beginning and ending of signs and for complexity of each gesture. In this paper, state automata is used for segmenting sequential signs into individual ones, and basic elements of KSL and KMA, which consist of 14 hand directions, 23 hand postures and 14 hand orientations are used for recognition of complex gestures under consideration of expandability. Using a pair of CyberGlove and Polhemus sensor, this system recognizes 131 Korean signs and 31 KMA's in real-time with recognition rate 94.3% for KSL excluding no recognition case and 96.7% for KMA.

  • PDF

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

A study on the analysis of unstructured data for customized education of learners in small learning groups (소규모학습그룹의 학습자 맞춤형 교육을 위한 비정형데이터분석 연구)

  • Min, Youn-A;Lim, Dong-Kyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.89-95
    • /
    • 2020
  • As the e-learning market expands, interest in customized education for learners based on artificial intelligence is increasing. Customized education for learners requires essential components such as a large amount of data and learning contents for learner analysis, and it requires time and cost efforts to collect such data. In this paper, to enable efficient learner-tailored learning even in small learning groups, unstructured learner data was analyzed using python modules, and a learning algorithm was presented based on this. Through the analysis of the unstructured learning data presented in this paper, it is possible to quantify and measure the unstructured data related to learning, and the accuracy of more than 80% was confirmed when analyzing keywords for providing customized education for learners.

Prevention of Women's Crime Using Autonomous car & Drones of Smart Police Efficient Multicasting Environment (스마트치안에서의 자율주행차 및 드론을 활용한 여성 범죄 예방 연구)

  • Kim, Seung-woo;Jung, Yu-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1294-1299
    • /
    • 2018
  • 'SMART Police' means collecting, analyzing and utilizing the police database such as crime statistics, reflecting 'strategic management', 'analysis and research', 'science technology' do. In recent years, the number of sex offenses has more than doubled based on the 'crime analysis' of the Supreme Prosecutors' In this trend, we started to build a sex crime prevention program for women 's relief special 3.0 which is suitable for regional characteristics. However, it was not enough for the women to have low publicity and utilization results, and to show the practical effect. In the future, we propose a crime prevention system which can safely take home safeguarding with autonomous driving car or drone by applying ICT to the future police system. Although it is difficult to operate autonomous vehicles and drones in the surrounding environment such as narrow alleys and power lines for application to this system, it is thought that the artificial intelligence technology can be sufficiently overcome to operate.

A Model for Effective Customer Classification Using LTV and Churn Probability : Application of Holistic Profit Method (고객의 이탈 가능성과 LTV를 이용한 고객등급화 모형개발에 관한 연구)

  • Lee, HoonYoung;Yang, JooHwan;Ryu, Chi Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.109-126
    • /
    • 2006
  • An effective customer classification has been essential for the successful customer relationship management. The typical customer rating is carried out by the proportionally allocating the customers into classes in terms of their life time values. However, since this method does not accurately reflect the homogeneity within a class along with the heterogeneity between classes, there would be many problems incurred due to the misclassification. This paper suggests a new method of rating customer using Holistic profit technique, and validates the new method using the customer data provided by an insurance company. Holistic profit is one of the methods used for deciding the cutoff score in screening the loan application. By rating customers using the proposed techniques, insurance companies could effectively perform customer relationship management and diverse marketing activities.

  • PDF

Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification

  • Wu, Chunming;Wang, Meng;Gao, Lang;Song, Weijing;Tian, Tian;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3917-3941
    • /
    • 2019
  • The recent interest in artificial intelligence and machine learning has partly contributed to an interest in the use of such approaches for hyperspectral remote sensing (HRS) imagery classification, as evidenced by the increasing number of deep framework with deep convolutional neural networks (CNN) structures proposed in the literature. In these approaches, the assumption of obtaining high quality deep features by using CNN is not always easy and efficient because of the complex data distribution and the limited sample size. In this paper, conventional handcrafted learning-based multi features based on expert knowledge are introduced as the input of a special designed CNN to improve the pixel description and classification performance of HRS imagery. The introduction of these handcrafted features can reduce the complexity of the original HRS data and reduce the sample requirements by eliminating redundant information and improving the starting point of deep feature training. It also provides some concise and effective features that are not readily available from direct training with CNN. Evaluations using three public HRS datasets demonstrate the utility of our proposed method in HRS classification.

Unification of Deep Learning Model trained by Parallel Learning in Security environment

  • Lee, Jong-Lark
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.69-75
    • /
    • 2021
  • Recently, deep learning, which is the most used in the field of artificial intelligence, has a structure that is gradually becoming larger and more complex. As the deep learning model grows, a large amount of data is required to learn it, but there are cases in which it is difficult to integrate and learn the data because the data is distributed among several owners and security issues. In that situation we conducted parallel learning for each users that own data and then studied how to integrate it. For this, distributed learning was performed for each owner assuming the security situation as V-environment and H-environment, and the results of distributed learning were integrated using Average, Max, and AbsMax. As a result of applying this to the mnist-fashion data, it was confirmed that there was no significant difference from the results obtained by integrating the data in the V-environment in terms of accuracy. In the H-environment, although there was a difference, meaningful results were obtained.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

The Effects of Logistics Technology Acceptance in the Fourth Industrial Revolution on Logistics Safety Performance: The Moderated Mediating Effect of Logistics Safety Behavior through Safety Culture

  • Kim, Young-Min
    • Journal of Korea Trade
    • /
    • v.26 no.1
    • /
    • pp.57-80
    • /
    • 2022
  • Purpose - This study aims to examine the relationships between the acceptance of the 4th industrial revolution logistics technology, logistics safety behavior, and logistics safety performance, as well as the moderated mediating effects of logistics safety behavior through safety culture in Korea. Design/methodology - Research models and hypotheses were established based on prior research related to the 4th industrial revolution logistics technology, logistics safety, and logistics performance. The survey was conducted on the employees of logistics companies, and reliability analysis, confirmatory factor analysis, discriminant validity analysis, structural equation model analysis, and mediating effect analysis were performed. In addition, the moderated mediating effect analysis applying SPSS Process Model No. 7 was conducted. Findings - Usefulness and sociality of the acceptance of the 4th industrial revolution logistics technology had a significant effect on logistics safety behavior. Ease of use, sociality, and efficiency had meaningful effect on logistics safety performance. And in the relationships between the acceptance of logistics technology and logistics safety performance, logistics safety behavior had a significant mediating effect. But the moderated mediating effect of safety behavior through safety culture was not significant. Logistics companies can improve logistics safety performance through the utilization of new logistics technologies such as intelligent logistics robots, autonomous driving technology, and artificial intelligence, etc. Originality/value - This is the first study to analyze the relationships between the acceptance of logistics technology in the 4th industrial revolution and logistics safety. In addition, previous studies analyzed mediating effects or moderating effects, but this is the first study to identify the moderated mediating effects of safety behavior through safety culture. In other words, it has originality in terms of research methodology.

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students (중국의 초·중등학생 대상 정보보호 교재 비교 고찰)

  • Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2023
  • Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.