• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.029 seconds

E-Business and Simulation

  • Park, Sung-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.9-10
    • /
    • 2001
  • Simulation has been evolved with the advance of computer and technique of modeling application systems. Early simulations were numerical analysis of engineering models known as continuous simulation, analysis of random events using various random number generators thus named as Monte Carlo simulation, iud analysis o(\\\\`queues which are prevalent in many real world systems including manufacturing, transportation, telecommunication. Discrete-event simulation has been used far modeling and analyzing the systems with waiting lines and inefficient delays. These simulations, either discrete-event, continuous, or hybrid, have played a key role in industrial age by helping to design and implement the efficient real world systems. In the information age which has been brought up by the advent of Internet, e-business has emerged. E-business, any business using Internet, can be characterized by the network of extended enterprises---extended supply and demand chains. The extension of value chains spans far reaching scope in business functions and space globally. It also extends to the individual customer, customer preferences and behaviors, to find the best service and product fit for each individual---mass customization. Simulation should also play a key role in analyzing and evaluating the various phenomena of e-business where the phenomena can be characterized by dynamics, uncertainty, and complexity. In this tutorial, applications of simulation to e-business phenomena will be explained and illustrated. Examples are the dynamics of new economy, analysis of e-business processes, virtual manufacturing system, digital divide phenomena, etc. Partly influenced by e-business, a new trend of simulation has emerged called agent-based simulation, Agent-based simulation is a technique of simulation using software agent that have autonomy and proactivity which are useful in analyzing and integrating numerous individual customer's behavior. One particular form of agent-based simulation is swarm. This tutorial concludes with the illustration of swarm or swarm Intelligence applied to various e-business applications, and future directions and implications of this new trend of simulation.

  • PDF

A Study on the Crime Prevention Smart System Based on Big Data Processing (빅데이터 처리 기반의 범죄 예방 스마트 시스템에 관한 연구)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.75-80
    • /
    • 2020
  • Since the Fourth Industrial Revolution, important technologies such as big data analysis, robotics, Internet of Things, and the artificial intelligence have been used in various fields. Generally speaking it is understood that the big-data technology consists of gathering stage for enormous data, analyzing and processing stage and distributing stage. Until now crime records which is one of useful big-sized data are utilized to obtain investigation information after occurring crimes. If crime records are utilized to predict crimes it is believed that crime occurring frequency can be lowered by processing big-sized crime records in big-data framework. In this research the design is proposed that the smart system can provide the users of smart devices crime occurrence probability by processing crime records in big-data analysis. Specifically it is meant that the proposed system will guide safer routes by displaying crime occurrence probabilities on the digital map in a smart device. In the experiment result for a smart application dealing with small local area it is showed that its usefulness is quite good in crime prevention.

Implementation of Intelligent and Human-Friendly Home Service Robot (인간 친화적인 가정용 지능형 서비스 로봇 구현)

  • Choi, Woo-Kyung;Kim, Seong-Joo;Kim, Jong-Soo;Jeo, Jae-Yong;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.720-725
    • /
    • 2004
  • Robot systems have applied to manufacturing or industrial field for reducing the need for human presence in dangerous and/or repetitive tasks. However, robot applications are transformed from industrial field to human life in recent tendency Nowadays, final goal of robot is to make a intelligent robot that can understand what human say and learn by itself and have internal emotion. For example Home service robots are able to provice functions such as security, housework, entertainment, education and secretary To provide various functions, home robots need to recognize human`s requirement and environment, and it is indispensable to use artificial intelligence technology for implementation of home robots. In this paper, implemented robot system takes data from several sensors and fuses the data to recognize environment information. Also, it can select a proper behavior for environment using soft computing method. Each behavior is composed with intuitive motion and sound in order to let human realize robot behavior well.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

A study on counting number of passengers by moving object detection (이동 객체 검출을 통한 승객 인원 개수에 대한 연구)

  • Yoo, Sang-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.9-18
    • /
    • 2020
  • In the field of image processing, a method of detecting and counting passengers as moving objects when getting on and off the bus has been studied. Among these technologies, one of the artificial intelligence techniques, the deep learning technique is used. As another method, a method of detecting an object using a stereo vision camera is also used. However, these techniques require expensive hardware equipment because of the computational complexity of used to detect objects. However, most video equipments have a significant decrease in computational processing power, and thus, in order to detect passengers on the bus, there is a need for an image processing technology suitable for various equipment using a relatively low computational technique. Therefore, in this paper, we propose a technique that can efficiently obtain the number of passengers on the bus by detecting the contour of the object through the background subtraction suitable for low-cost equipment. Experiments have shown that passengers were counted with approximately 70% accuracy on lower-end machines than those equipped with stereo vision camera.

Proposal of IT Trend and Prospect-Conscious Research Issues on Internet (인터넷 관련 IT 동향 및 전망을 통한 연구이슈 제안)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.153-160
    • /
    • 2017
  • Due to the endeavors and performances of many IT firms, as well as the government supports, the IT capability of Korea was ranked in the top 8th position by Huawei in 2015. Specifically, as far as the wire & wireless network and Internet speed, Korea has taken pride in possessing the competitive advantage. However, many academic and practical experts began to point out the lack of systematic research management on Internet. The purpose of the study is to identify various research issues on Internet and to verify their appropriateness. In addition, the study examined their recent trends and provided the prospect of the future Internet-related researches. Consequently, the finding indicates that the rigorous endeavors and outcomes for each proposed research issue have been resulted in and will be continued. The study anticipates the growing demands of researches in the fields of future network, multimedia application, big data, artificial intelligence, and Internet security.

Fake News Detection for Korean News Using Text Mining and Machine Learning Techniques (텍스트 마이닝과 기계 학습을 이용한 국내 가짜뉴스 예측)

  • Yun, Tae-Uk;Ahn, Hyunchul
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.1
    • /
    • pp.19-32
    • /
    • 2018
  • Fake news is defined as the news articles that are intentionally and verifiably false, and could mislead readers. Spread of fake news may provoke anxiety, chaos, fear, or irrational decisions of the public. Thus, detecting fake news and preventing its spread has become very important issue in our society. However, due to the huge amount of fake news produced every day, it is almost impossible to identify it by a human. Under this context, researchers have tried to develop automated fake news detection method using Artificial Intelligence techniques over the past years. But, unfortunately, there have been no prior studies proposed an automated fake news detection method for Korean news. In this study, we aim to detect Korean fake news using text mining and machine learning techniques. Our proposed method consists of two steps. In the first step, the news contents to be analyzed is convert to quantified values using various text mining techniques (Topic Modeling, TF-IDF, and so on). After that, in step 2, classifiers are trained using the values produced in step 1. As the classifiers, machine learning techniques such as multiple discriminant analysis, case based reasoning, artificial neural networks, and support vector machine can be applied. To validate the effectiveness of the proposed method, we collected 200 Korean news from Seoul National University's FactCheck (http://factcheck.snu.ac.kr). which provides with detailed analysis reports from about 20 media outlets and links to source documents for each case. Using this dataset, we will identify which text features are important as well as which classifiers are effective in detecting Korean fake news.

An Analysis System Using Big Data based Real Time Monitoring of Vital Sign: Focused on Measuring Baseball Defense Ability (빅데이터 기반의 실시간 생체 신호 모니터링을 이용한 분석시스템: 야구 수비능력 측정을 중심으로)

  • Oh, Young-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.221-228
    • /
    • 2018
  • Big data is an important keyword in World's Fourth Industrial Revolution in public and private division including IoT(Internet of Things), AI(Artificial Intelligence) and Cloud system in the fields of science, technology, industry and society. Big data based on services are available in various fields such as transportation, weather, medical care, and marketing. In particular, in the field of sports, various types of bio-signals can be collected and managed by the appearance of a wearable device that can measure vital signs in training or rehabilitation for daily life rather than a hospital or a rehabilitation center. However, research on big data with vital signs from wearable devices for training and rehabilitation for baseball players have not yet been stimulated. Therefore, in this paper, we propose a system for baseball infield and outfield players, especially which can store and analyze the momentum measurement vital signals based on big data.

A Study on Improvement of Call Admission Control using Wireless Access Point Sharing (무선 AP 공유를 통한 호 제어 방안 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.91-96
    • /
    • 2018
  • Recently, as artificial intelligence technology becomes popular, demand for wireless traffic is rapidly increasing. In order to provide services in response to the increase in demand for wireless traffic, telecommunication companies are generalizing the installation of public APs. In order to provide convenience of using wireless APs between communication companies, it is necessary to share the use of APs in public places to efficiently use wireless resources in a public place, to pre-authenticate between wireless APs in a mobile communication service, So as to increase the convenience of the user. In this paper, we propose to share APs in public places through handoff between APs and pre-authentication between carriers in mobile communication services. The simulation results show that the handoff latency is improved by 35.1% and the bandwidth used by the AP selected by the pre-authentication method can utilize more bandwidth than the method of automatically selecting the AP.

An LDPC Code Replication Scheme Suitable for Cloud Computing (클라우드 컴퓨팅에 적합한 LDPC 부호 복제 기법)

  • Kim, Se-Hoe;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.134-142
    • /
    • 2012
  • This paper analyze an LDPC code replication method suitable for cloud computing. First, we determine the number of blocks suitable for cloud computing through analysis of the performance for the file availability and storage overhead. Also we determine the type of LDPC code appropriate for cloud computing through the performance for three types of LDPC codes. Finally we present the graph random generation method and the comparing method of each generated LDPC code's performance by the iterative decoding process. By the simulation, we confirmed the best graph's regularity is left-regular or least left-regular. Also, we confirmed the best graph's total number of edges are minimum value or near the minimum value.