• Title/Summary/Keyword: Data Acquisition Technologies

Search Result 149, Processing Time 0.022 seconds

Utilization of Smart Farms in Open-field Agriculture Based on Digital Twin (디지털 트윈 기반 노지스마트팜 활용방안)

  • Kim, Sukgu
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2023.04a
    • /
    • pp.7-7
    • /
    • 2023
  • Currently, the main technologies of various fourth industries are big data, the Internet of Things, artificial intelligence, blockchain, mixed reality (MR), and drones. In particular, "digital twin," which has recently become a global technological trend, is a concept of a virtual model that is expressed equally in physical objects and computers. By creating and simulating a Digital twin of software-virtualized assets instead of real physical assets, accurate information about the characteristics of real farming (current state, agricultural productivity, agricultural work scenarios, etc.) can be obtained. This study aims to streamline agricultural work through automatic water management, remote growth forecasting, drone control, and pest forecasting through the operation of an integrated control system by constructing digital twin data on the main production area of the nojinot industry and designing and building a smart farm complex. In addition, it aims to distribute digital environmental control agriculture in Korea that can reduce labor and improve crop productivity by minimizing environmental load through the use of appropriate amounts of fertilizers and pesticides through big data analysis. These open-field agricultural technologies can reduce labor through digital farming and cultivation management, optimize water use and prevent soil pollution in preparation for climate change, and quantitative growth management of open-field crops by securing digital data for the national cultivation environment. It is also a way to directly implement carbon-neutral RED++ activities by improving agricultural productivity. The analysis and prediction of growth status through the acquisition of the acquired high-precision and high-definition image-based crop growth data are very effective in digital farming work management. The Southern Crop Department of the National Institute of Food Science conducted research and development on various types of open-field agricultural smart farms such as underground point and underground drainage. In particular, from this year, commercialization is underway in earnest through the establishment of smart farm facilities and technology distribution for agricultural technology complexes across the country. In this study, we would like to describe the case of establishing the agricultural field that combines digital twin technology and open-field agricultural smart farm technology and future utilization plans.

  • PDF

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Experimental Study for the Capacity of Ordinary and Emergency Ventilation System in Deeply Underground Subway Station (대심도 지하역사 승강장 및 대합실 평상시/비상시 급·배기 풍량에 대한 실험적 연구)

  • Jang, Yong-Jun;Lee, Ho-Seok;Park, Duck-Shin
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.6
    • /
    • pp.579-587
    • /
    • 2012
  • Shin-gumho station in Seoul underground subway have been selected to be experimentally investigated and analyzed for the real air supply & exhaust capacity compared to the original capacity of ordinary and emergency condition. The depth of Shin-gumho station is 43.6m which consists of the island-type platform ($8^{th}$ floor in underground) and a two-story lobby (first & second floor in underground). An emergency staircase connects between the platform and the lobby. Hot-wire anemometer, capture hood, wind vane & velocity meter and data acquisition systems are employed to perform the automatic measurement in this experiment. For ordinary case, air supply and exhaust capacity in the lobby were reduced by 34% and 46% compared to the original capacity, respectively. Air supply and exhaust capacity in the platform were reduced by 66% and 38%, respectively. For emergency case, air supply in the lobby was reduced by 42% and air exhaust in the platform was reduced by 28% compared to the original capacity. Therefore, air pollution in the station is expected to be worse in the ordinary environment and smoke control capability in the platform will be weakened in case of fire emergency.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

A Study on intent to use AI-enhanced development tools (AI 증강 개발 도구 사용의도에 관한 연구)

  • Hyun Ji Eun;Lee Seung Hwan;Gim Gwang Yong
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.89-104
    • /
    • 2024
  • This study is an empirical study to examine the factors that influence the intention to use artificial intelligence (AI) technology for SW engineering-related tasks, and the purpose of the study is to understand the key factors that influence the use in terms of AI augmentation characteristics and interactive UI/UX characteristics. For this purpose, a survey was conducted among information and communication workers who have experience in using AI-related technologies and the collected data was analyzed. The results of the empirical analysis showed that perceived usefulness was positively influenced by the factors of expertise, interestingness, realism, aesthetics, efficiency, and flexibility, and perceived ease of use was positively influenced by the factors of expertise, interestingness, realism, aesthetics, and flexibility. Variety had no effect on both perceived ease of use and perceived usefulness. Perceived ease of use had a significant effect on perceived immersion, which positively influenced intention to use. These findings are significant in that they provide an academic understanding of the factors that influence the use of AI-enhanced tools in SW engineering-related tasks such as application design, development, testing, and process automation, as well as practical directions for the creators of tools that provide AI-enhanced development services to develop user acquisition strategies.

The Factors Affecting Attitudes Toward HSDPA Service and Intention to Use: A Cross-Cultural Comparison between Asia and Europe (대영향(对影响)HSDPA복무적태도화사용의도적인소적연구(服务的态度和使用意图的因素的研究): 재아주화구주지간적(在亚洲和欧洲之间的)-개과문화비교(个跨文化比较))

  • Jung, Hae-Sung;Shin, Jong-Kuk;Park, Min-Sook;Jung, Hong-Seob;Hooley, Graham;Lee, Nick;Kwak, Hyok-Jin;Kim, Sung-Hyun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.11-23
    • /
    • 2009
  • HSDPA (High-Speed Downlink Packet Access) is a 3.5-generation asynchronous mobile communications service based on the third generation of W-CDMA. In Korea, it is mainly provided in through videophone service. Because of the diffusion of more powerful and diversified services, along with steep advances in mobile communications technology, consumers demand a wide range of choices. However, because of the variety of technologies, which tend to overflow the market regardless of consumer preferences, consumers feel increasingly confused. Therefore, we should not adopt strategies that focus only on developing new technology on the assumption that new technologies are next-generation projects. Instead, we should understand the process by which consumers accept new forms of technology and devise schemes to lower market entry barriers through strategies that enable developers to understand and provide what consumers really want. In the Technology Acceptance Model (TAM), perceived usefulness and perceived ease of use are suggested as the most important factors affecting the attitudes of people adopting new technologies (Davis, 1989; Taylor and Todd, 1995; Venkatesh, 2000; Lee et al., 2004). Perceived usefulness is the degree to which a person believes that a particular technology will enhance his or her job performance. Perceived ease of use is the degree of subjective belief that using a particular technology will require little physical and mental effort (Davis, 1989; Morris and Dillon, 1997; Venkatesh, 2000). Perceived pleasure and perceived usefulness have been shown to clearly affect attitudes toward accepting technology (Davis et al., 1992). For example, pleasure in online shopping has been shown to positively impact consumers' attitudes toward online sellers (Eighmey and McCord, 1998; Mathwick, 2002; Jarvenpaa and Todd, 1997). The perceived risk of customers is a subjective risk, which is distinguished from an objective probabilistic risk. Perceived risk includes a psychological risk that consumers perceive when they choose brands, stores, and methods of purchase to obtain a particular item. The ability of an enterprise to revolutionize products depends on the effective acquisition of knowledge about new products (Bierly and Chakrabarti, 1996; Rothwell and Dodgson, 1991). Knowledge acquisition is the ability of a company to perceive the value of novelty and technology of the outside (Cohen and Levinthal, 1990), to evaluate the outside technology that has newly appeared (Arora and Gambaradella, 1994), and to predict the future evolution of technology accurately (Cohen and Levinthal, 1990). Consumer innovativeness is the degree to which an individual adopts innovation earlier than others in the social system (Lee, Ahn, and Ha, 2001; Gatignon and Robertson, 1985). That is, it shows how fast and how easily consumers adopt new ideas. Innovativeness is regarded as important because it has a significant effect on whether consumers adopt new products and on how fast they accept new products (Midgley and Dowling, 1978; Foxall, 1988; Hirschman, 1980). We conducted cross-national comparative research using the TAM model, which empirically verified the relationship between the factors that affect attitudes - perceived usefulness, ease of use, perceived pleasure, perceived risk, innovativeness, and perceived level of knowledge management - and attitudes toward HSDPA service. We also verified the relationship between attitudes and usage intention for the purpose of developing more effective methods of management for HSDPA service providers. For this research, 346 questionnaires were distributed among 350 students in the Republic of Korea. Because 26 of the returned questionnaires were inconsistent or had missing data, 320 questionnaires were used in the hypothesis tests. In UK, 192 of the total 200 questionnaires were retrieved, and two incomplete ones were discarded, bringing the total to 190 questionnaires used for statistical analysis. The results of the overall model analysis are as follows: Republic of Korea x2=333.27(p=0.0), NFI=0.88, NNFI=0.88, CFI=0.91, IFI=0.91, RMR=0.054, GFI=0.90, AGFI=0.84, UK x2=176.57(p=0.0), NFI=0.88, NNFI=0.90, CFI=0.93, IFI=0.93, RMR=0.062, GFI=0.90, AGFI=0.84. From the results of the hypothesis tests of Korean consumers about the relationship between factors that affect intention to use HSDPA services and attitudes, we can conclude that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness promote positive attitudes toward HSDPA mobile phones. However, ease of use and perceived pleasure did not have a direct effect on intention to use HSDPA service. This may have resulted from the fact that the use of video phones is not necessary for everyday life yet. Moreover, it has been shown that attitudes toward HSDPA video phones are directly correlated with usage intention, which means that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness. These relationships form the basis of the intention to buy, contributing to a situation in which consumers decide to choose carefully. A summary of the results of the hypothesis tests of European consumers revealed that perceived usefulness, pleasure, risk, and the level of knowledge management are factors that affect the formation of attitudes, while ease of use and innovativeness do not have an effect on attitudes. In particular, with regard to the effect value, perceived usefulness has the largest effect on attitudes, followed by pleasure and knowledge management. On the contrary, perceived risk has a smaller effect on attitudes. In the Asian model, ease of use and perceived pleasure were found not to have a direct effect on intention to use. However, because attitudes generally affect the intention to use, perceived usefulness, pleasure, risk, and knowledge management may be considered key factors in attitude development from which usage intention arises. In conclusion, perceived usefulness, pleasure, and the level of knowledge management have an effect on attitude formation in both Asian and European consumers, and such attitudes shape these consumers' intention to use. Furthermore, the hypotheses that ease of use and perceived pleasure affect usage intention are rejected. However, ease of use, perceived risk, and innovativeness showed different results. Perceived risk had no effect on attitude formation among Asians, while ease of use and innovativeness had no effect on attitudes among Europeans.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Prospective for Successful IT in Agriculture (일본 농업분야 정보기술활용 성공사례와 전망)

  • Seishi Ninomiya;Byong-Lyol Lee
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.6 no.2
    • /
    • pp.107-117
    • /
    • 2004
  • If doubtlessly contributes much to agriculture and rural development. The roles can be summarized as; 1. to activate rural areas and to provide more comfortable and safe rural life with equivalent services to those in urban areas, facilitating distance education, tole-medicine, remote public services, remote entertainment etc. 2. To initiate new agricultural and rural business such as e-commerce, real estate business for satellite officies, rural tourism and virtual corporation of small-scale farms. 3. To support policy-making and evaluation on optimal farm production, disaster management, effective agro-environmental resource management etc., providing tools such as GIS. 4. To improve farm management and farming technologies by efficient farm management, risk management, effective information or knowledge transfer etc., realizing competitive and sustainable farming with safe products. 5. To provide systems and tools to secure food traceability and reliability that has been an emerging issue concerning farm products since serious contamination such as BSE and chicken flu was detected. 6. To take an important and key role for industrialization of farming or lam business enterprise, combining the above roles.

Emoticon by Emotions: The Development of an Emoticon Recommendation System Based on Consumer Emotions (Emoticon by Emotions: 소비자 감성 기반 이모티콘 추천 시스템 개발)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.227-252
    • /
    • 2018
  • The evolution of instant communication has mirrored the development of the Internet and messenger applications are among the most representative manifestations of instant communication technologies. In messenger applications, senders use emoticons to supplement the emotions conveyed in the text of their messages. The fact that communication via messenger applications is not face-to-face makes it difficult for senders to communicate their emotions to message recipients. Emoticons have long been used as symbols that indicate the moods of speakers. However, at present, emoticon-use is evolving into a means of conveying the psychological states of consumers who want to express individual characteristics and personality quirks while communicating their emotions to others. The fact that companies like KakaoTalk, Line, Apple, etc. have begun conducting emoticon business and sales of related content are expected to gradually increase testifies to the significance of this phenomenon. Nevertheless, despite the development of emoticons themselves and the growth of the emoticon market, no suitable emoticon recommendation system has yet been developed. Even KakaoTalk, a messenger application that commands more than 90% of domestic market share in South Korea, just grouped in to popularity, most recent, or brief category. This means consumers face the inconvenience of constantly scrolling around to locate the emoticons they want. The creation of an emoticon recommendation system would improve consumer convenience and satisfaction and increase the sales revenue of companies the sell emoticons. To recommend appropriate emoticons, it is necessary to quantify the emotions that the consumer sees and emotions. Such quantification will enable us to analyze the characteristics and emotions felt by consumers who used similar emoticons, which, in turn, will facilitate our emoticon recommendations for consumers. One way to quantify emoticons use is metadata-ization. Metadata-ization is a means of structuring or organizing unstructured and semi-structured data to extract meaning. By structuring unstructured emoticon data through metadata-ization, we can easily classify emoticons based on the emotions consumers want to express. To determine emoticons' precise emotions, we had to consider sub-detail expressions-not only the seven common emotional adjectives but also the metaphorical expressions that appear only in South Korean proved by previous studies related to emotion focusing on the emoticon's characteristics. We therefore collected the sub-detail expressions of emotion based on the "Shape", "Color" and "Adumbration". Moreover, to design a highly accurate recommendation system, we considered both emotion-technical indexes and emoticon-emotional indexes. We then identified 14 features of emoticon-technical indexes and selected 36 emotional adjectives. The 36 emotional adjectives consisted of contrasting adjectives, which we reduced to 18, and we measured the 18 emotional adjectives using 40 emoticon sets randomly selected from the top-ranked emoticons in the KakaoTalk shop. We surveyed 277 consumers in their mid-twenties who had experience purchasing emoticons; we recruited them online and asked them to evaluate five different emoticon sets. After data acquisition, we conducted a factor analysis of emoticon-emotional factors. We extracted four factors that we named "Comic", Softness", "Modernity" and "Transparency". We analyzed both the relationship between indexes and consumer attitude and the relationship between emoticon-technical indexes and emoticon-emotional factors. Through this process, we confirmed that the emoticon-technical indexes did not directly affect consumer attitudes but had a mediating effect on consumer attitudes through emoticon-emotional factors. The results of the analysis revealed the mechanism consumers use to evaluate emoticons; the results also showed that consumers' emoticon-technical indexes affected emoticon-emotional factors and that the emoticon-emotional factors affected consumer satisfaction. We therefore designed the emoticon recommendation system using only four emoticon-emotional factors; we created a recommendation method to calculate the Euclidean distance from each factors' emotion. In an attempt to increase the accuracy of the emoticon recommendation system, we compared the emotional patterns of selected emoticons with the recommended emoticons. The emotional patterns corresponded in principle. We verified the emoticon recommendation system by testing prediction accuracy; the predictions were 81.02% accurate in the first result, 76.64% accurate in the second, and 81.63% accurate in the third. This study developed a methodology that can be used in various fields academically and practically. We expect that the novel emoticon recommendation system we designed will increase emoticon sales for companies who conduct business in this domain and make consumer experiences more convenient. In addition, this study served as an important first step in the development of an intelligent emoticon recommendation system. The emotional factors proposed in this study could be collected in an emotional library that could serve as an emotion index for evaluation when new emoticons are released. Moreover, by combining the accumulated emotional library with company sales data, sales information, and consumer data, companies could develop hybrid recommendation systems that would bolster convenience for consumers and serve as intellectual assets that companies could strategically deploy.