• Title/Summary/Keyword: Information Use Environments

Search Result 1,191, Processing Time 0.027 seconds

A Study on Efficient Methods of Pesticide Control Using Agricultural Unmanned Aerial Vehicles (농업용 무인항공기를 활용한 농약방제 효율성 방안에 관한 연구)

  • Jeong, Ga-Young;Cho, Yong-Yoon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.35-40
    • /
    • 2022
  • In the agricultural environment, pesticide control requires a high risk of work and a high labor force for farmers. The effectiveness of pesticide control using unmanned aerial vehicles varies according to climate, land type, and characteristics of unmanned aerial vehicles. Therefore, an effective method for pesticide control by unmanned aerial vehicles considering the spraying conditions and environmental conditions is required. In this paper, we propose an efficient pesticide control system based on agricultural unmanned aerial vehicles considering the application conditions and environmental information for each crop. The effectiveness of the proposed model was demonstrated by measuring the drop uniformity of pesticides according to the change in altitude and speed after attaching the sensory paper and measuring the penetration rate of the drug inside the canopy according to the change in crop growth conditions. Experiment result, the closer the height of the UAV is to the ground, the more evenly the crops are sprayed, but for safety reasons, 2m more is suitable, and on average a speed of 2m/s is most suitable for control. The proposed control system is expected to help develop intelligent services based on the use of various unmanned aerial vehicles in agricultural environments.

IoT data trust techniques based on auto-encoder through IoT-linked processing (오토인코더 기반의 IoT 연계 처리를 통한 IoT 데이터 신뢰 기법)

  • Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.351-357
    • /
    • 2021
  • IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Development of a Water Quality Indicator Prediction Model for the Korean Peninsula Seas using Artificial Intelligence (인공지능 기법을 활용한 한반도 해역의 수질평가지수 예측모델 개발)

  • Seong-Su Kim;Kyuhee Son;Doyoun Kim;Jang-Mu Heo;Seongeun Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.1
    • /
    • pp.24-35
    • /
    • 2023
  • Rapid industrialization and urbanization have led to severe marine pollution. A Water Quality Index (WQI) has been developed to allow the effective management of marine pollution. However, the WQI suffers from problems with loss of information due to the complex calculations involved, changes in standards, calculation errors by practitioners, and statistical errors. Consequently, research on the use of artificial intelligence techniques to predict the marine and coastal WQI is being conducted both locally and internationally. In this study, six techniques (RF, XGBoost, KNN, Ext, SVM, and LR) were studied using marine environmental measurement data (2000-2020) to determine the most appropriate artificial intelligence technique to estimate the WOI of five ecoregions in the Korean seas. Our results show that the random forest method offers the best performance as compared to the other methods studied. The residual analysis of the WQI predicted score and actual score using the random forest method shows that the temporal and spatial prediction performance was exceptional for all ecoregions. In conclusion, the RF model of WQI prediction developed in this study is considered to be applicable to Korean seas with high accuracy.

Vision-based Low-cost Walking Spatial Recognition Algorithm for the Safety of Blind People (시각장애인 안전을 위한 영상 기반 저비용 보행 공간 인지 알고리즘)

  • Sunghyun Kang;Sehun Lee;Junho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.81-89
    • /
    • 2023
  • In modern society, blind people face difficulties in navigating common environments such as sidewalks, elevators, and crosswalks. Research has been conducted to alleviate these inconveniences for the visually impaired through the use of visual and audio aids. However, such research often encounters limitations when it comes to practical implementation due to the high cost of wearable devices, high-performance CCTV systems, and voice sensors. In this paper, we propose an artificial intelligence fusion algorithm that utilizes low-cost video sensors integrated into smartphones to help blind people safely navigate their surroundings during walking. The proposed algorithm combines motion capture and object detection algorithms to detect moving people and various obstacles encountered during walking. We employed the MediaPipe library for motion capture to model and detect surrounding pedestrians during motion. Additionally, we used object detection algorithms to model and detect various obstacles that can occur during walking on sidewalks. Through experimentation, we validated the performance of the artificial intelligence fusion algorithm, achieving accuracy of 0.92, precision of 0.91, recall of 0.99, and an F1 score of 0.95. This research can assist blind people in navigating through obstacles such as bollards, shared scooters, and vehicles encountered during walking, thereby enhancing their mobility and safety.

Gear Fault Diagnosis Based on Residual Patterns of Current and Vibration Data by Collaborative Robot's Motions Using LSTM (LSTM을 이용한 협동 로봇 동작별 전류 및 진동 데이터 잔차 패턴 기반 기어 결함진단)

  • Baek Ji Hoon;Yoo Dong Yeon;Lee Jung Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.445-454
    • /
    • 2023
  • Recently, various fault diagnosis studies are being conducted utilizing data from collaborative robots. Existing studies performing fault diagnosis on collaborative robots use static data collected based on the assumed operation of predefined devices. Therefore, the fault diagnosis model has a limitation of increasing dependency on the learned data patterns. Additionally, there is a limitation in that a diagnosis reflecting the characteristics of collaborative robots operating with multiple joints could not be conducted due to experiments using a single motor. This paper proposes an LSTM diagnostic model that can overcome these two limitations. The proposed method selects representative normal patterns using the correlation analysis of vibration and current data in single-axis and multi-axis work environments, and generates residual patterns through differences from the normal representative patterns. An LSTM model that can perform gear wear diagnosis for each axis is created using the generated residual patterns as inputs. This fault diagnosis model can not only reduce the dependence on the model's learning data patterns through representative patterns for each operation, but also diagnose faults occurring during multi-axis operation. Finally, reflecting both internal and external data characteristics, the fault diagnosis performance was improved, showing a high diagnostic performance of 98.57%.

Limitations of National Responsibility and its Application on Marine Environmental Pollution beyond Borders -Focused on the Effects of China's Three Gorges Dam on the Marine Environment in the East China Sea- (국경을 넘는 해양환경오염에 대한 국가책임과 적용의 한계 -중국의 산샤댐 건설로 인한 동중국해 해양환경 영향을 중심으로-)

  • Yang, Hee Cheol
    • Ocean and Polar Research
    • /
    • v.37 no.4
    • /
    • pp.341-356
    • /
    • 2015
  • A nation has a sovereign right to develop and use its natural resources according to its policies with regard to development and the relevant environment. A nation also has an obligation not to harm other countries or damage environments of neighboring countries as consequences of such actions of developments or use of natural resources. However, international precedents induce a nation to take additional actions not to cause more damages from the specific acts causing environmental damages beyond national borders, when such acts have economic and social importance. That is to say that there is a tendency to resolve such issues in a way to promote the balance between the mutual interests by allowing such actions to continue. A solution to China's Three Gorges Dam dilemma based on a soft law approach is more credible than relying on a good faith approach of national responsibilities and international legal proceedings since the construction and operation of the dam falls within the category of exercising national sovereign rights. If a large scale construction project such as the Three Gorges Dam or operation of a nuclear power plant causes or may cause environmental damage beyond the border of a nation engaged in such an undertaking, countries affected by this undertaking should jointly monitor the environmental effects in a spirit of cooperation rather than trying to stop the construction and should seek cooperative solutions of mutual understanding to establish measures to prevent further damages. If China's Three Gorges Dam construction and operation cause or contain the possibility of causing serious damages to marine environment, China cannot set aside its national responsibility to meet international obligations if China is aware of or knows about the damage that has occurred or may occur but fail to prevent, minimize, reverse or eliminate additional chances of such damages, or fails to put in place measures in order to prevent the recurrence of such damages. However, Korea must be able to prove a causal relationship between the relevant actions and resulting damages if it is to raise objections to the construction or request certain damage-prevention actions against crucial adverse effects on the marine environment out of respect for China's right to develop resources and acts of use thereof. Therefore, it is essential to cumulate continuous monitoring and evaluations information pertaining to marine environmental changes and impacts or responses of affected waters as well as acquisition of scientific baseline data with observed changes in such baseline. As China has adopted a somewhat nonchalant attitude toward taking adequate actions to protect against marine pollution risks or adverse effects caused by the construction and operation of China's Three Gorges Dam, there is a need to persuade China to adopt a more active stance and become involved in the monitoring and co-investigation of the Yellow Sea in order to protect the marine environment. Moreover, there is a need to build a regular environmental monitoring system that includes the evaluation of environmental effects beyond borders. The Espoo Convention can serve as a mechanism to ease potential conflicts of national interest in the Northeast Asian waters where political and historical sensitivities are acute. Especially, the recent diplomatic policy advanced by Korea and China can be implemented as an important example of gentle cooperation as the policy tool of choice is based on regional cooperation or cooperation between different regions.

Using the METHONTOLOGY Approach to a Graduation Screen Ontology Development: An Experiential Investigation of the METHONTOLOGY Framework

  • Park, Jin-Soo;Sung, Ki-Moon;Moon, Se-Won
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.125-155
    • /
    • 2010
  • Ontologies have been adopted in various business and scientific communities as a key component of the Semantic Web. Despite the increasing importance of ontologies, ontology developers still perceive construction tasks as a challenge. A clearly defined and well-structured methodology can reduce the time required to develop an ontology and increase the probability of success of a project. However, no reliable knowledge-engineering methodology for ontology development currently exists; every methodology has been tailored toward the development of a particular ontology. In this study, we developed a Graduation Screen Ontology (GSO). The graduation screen domain was chosen for the several reasons. First, the graduation screen process is a complicated task requiring a complex reasoning process. Second, GSO may be reused for other universities because the graduation screen process is similar for most universities. Finally, GSO can be built within a given period because the size of the selected domain is reasonable. No standard ontology development methodology exists; thus, one of the existing ontology development methodologies had to be chosen. The most important considerations for selecting the ontology development methodology of GSO included whether it can be applied to a new domain; whether it covers a broader set of development tasks; and whether it gives sufficient explanation of each development task. We evaluated various ontology development methodologies based on the evaluation framework proposed by G$\acute{o}$mez-P$\acute{e}$rez et al. We concluded that METHONTOLOGY was the most applicable to the building of GSO for this study. METHONTOLOGY was derived from the experience of developing Chemical Ontology at the Polytechnic University of Madrid by Fern$\acute{a}$ndez-L$\acute{o}$pez et al. and is regarded as the most mature ontology development methodology. METHONTOLOGY describes a very detailed approach for building an ontology under a centralized development environment at the conceptual level. This methodology consists of three broad processes, with each process containing specific sub-processes: management (scheduling, control, and quality assurance); development (specification, conceptualization, formalization, implementation, and maintenance); and support process (knowledge acquisition, evaluation, documentation, configuration management, and integration). An ontology development language and ontology development tool for GSO construction also had to be selected. We adopted OWL-DL as the ontology development language. OWL was selected because of its computational quality of consistency in checking and classification, which is crucial in developing coherent and useful ontological models for very complex domains. In addition, Protege-OWL was chosen for an ontology development tool because it is supported by METHONTOLOGY and is widely used because of its platform-independent characteristics. Based on the GSO development experience of the researchers, some issues relating to the METHONTOLOGY, OWL-DL, and Prot$\acute{e}$g$\acute{e}$-OWL were identified. We focused on presenting drawbacks of METHONTOLOGY and discussing how each weakness could be addressed. First, METHONTOLOGY insists that domain experts who do not have ontology construction experience can easily build ontologies. However, it is still difficult for these domain experts to develop a sophisticated ontology, especially if they have insufficient background knowledge related to the ontology. Second, METHONTOLOGY does not include a development stage called the "feasibility study." This pre-development stage helps developers ensure not only that a planned ontology is necessary and sufficiently valuable to begin an ontology building project, but also to determine whether the project will be successful. Third, METHONTOLOGY excludes an explanation on the use and integration of existing ontologies. If an additional stage for considering reuse is introduced, developers might share benefits of reuse. Fourth, METHONTOLOGY fails to address the importance of collaboration. This methodology needs to explain the allocation of specific tasks to different developer groups, and how to combine these tasks once specific given jobs are completed. Fifth, METHONTOLOGY fails to suggest the methods and techniques applied in the conceptualization stage sufficiently. Introducing methods of concept extraction from multiple informal sources or methods of identifying relations may enhance the quality of ontologies. Sixth, METHONTOLOGY does not provide an evaluation process to confirm whether WebODE perfectly transforms a conceptual ontology into a formal ontology. It also does not guarantee whether the outcomes of the conceptualization stage are completely reflected in the implementation stage. Seventh, METHONTOLOGY needs to add criteria for user evaluation of the actual use of the constructed ontology under user environments. Eighth, although METHONTOLOGY allows continual knowledge acquisition while working on the ontology development process, consistent updates can be difficult for developers. Ninth, METHONTOLOGY demands that developers complete various documents during the conceptualization stage; thus, it can be considered a heavy methodology. Adopting an agile methodology will result in reinforcing active communication among developers and reducing the burden of documentation completion. Finally, this study concludes with contributions and practical implications. No previous research has addressed issues related to METHONTOLOGY from empirical experiences; this study is an initial attempt. In addition, several lessons learned from the development experience are discussed. This study also affords some insights for ontology methodology researchers who want to design a more advanced ontology development methodology.

A Study on Strategy for developing LBS Entertainment content based on local tourist information (지역 관광 정보를 활용한 LBS 엔터테인먼트 컨텐츠 개발 방안에 관한 연구)

  • Kim, Hyun-Jeong
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.151-162
    • /
    • 2007
  • How can new media devices and networks provide an effective response to the world's growing sector of cultural and historically-minded travelers? This study emerged from the question of how mobile handsets can change the nature of cultural and historical tourism in ubiquitous city environments. As wireless network and mobile IT have rapidly developed, it becomes possible to deliver cultural and historical information on the site through mobile handset as a tour guidance system. The paper describes the development of a new type of mobile tourism platform for site-specific cultural and historical information. The central objective of the project was to organize this cultural and historical walking tour around the mobile handset and its unique advantages (i.e. portability, multi-media capacity, access to wireless internet, and location-awareness potential) and then integrate the tour with a historical story and role-playing game that would deepen the mobile user's interest in the sites being visited, and enhance his or her overall experience of the area. The project was based on twelve locations that were culturally and historically significant to Korean War era in Busan. After the mobile tour game prototype was developed for this route, it was evaluated at the 10th PIFF (Pusan International Film Festival). After use test, some new strategies for developing mobile "edutainment content" to deliver cultural historical contents of the location were discussed. Combining 'edutainment' with a cultural and historical mobile walking tour brings a new dimension to existing approaches of the tourism and mobile content industry.

  • PDF

Long-term Variation in Ocean Environmental Conditions of the Northern East China Sea (동중국해 북부해역의 해양환경 장기변동)

  • Yoon, Sang Chol;Youn, Suk Hyun;Whang, Jae Dong;Suh, Young Sang;Yoon, Yi Yong
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.18 no.3
    • /
    • pp.189-206
    • /
    • 2015
  • The present study was conducted to investigate the oceanic characteristics of the northern East China Sea through identification of long-term variation patterns of oceanic environment factors, for the objective of gaining understanding of oceanic environment characteristics of the northern waters of East China Sea, which closely influence the oceanic environments of waters nearby South Korea. The study methodology included the use of oceanographic data (water temperature, salinity, dissolved oxygen, nutrients, and chlorophyll-a) on the northern East China Sea from the Korea Oceanographic Data Center (KODC), collected by season for 20 years between 1995 and 2014. Moreover, for the study on the distribution of nutrients, chlorophyll-a. The main water masses that affected the northern East China Sea during the study period were classified as Changjiang diluted water (CDW), Tiawan current warm water (TCWW), Yellow Sea cold water (YSCW), and Kuroshio source water (KW). The forces of CDW and TCWW that forms on the surface and sub-surface layers had weakened for 20 years and the force of KW that forms on the intermediate layer showed a distinctively decreasing trend. However, YSCW showed a trend of expanding its force. Phosphate and silicate exhibited a decreasing tendency and phosphate showed a pattern of being depleted on the surface layer after 2009. It is determined that one of the reasons for this is the concentration of nutrients introduced through CDW and TCWW being too low. The concentration of chlorophyll-a exhibited an increasing tendency during the study period, the reasons for which are determined to be the influences of increase in water temperature, supply of nutrients via YSCW, and increases in light transmission from decrease in suspended solid due to the construction of the Three Gorges Dam.