• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.031 seconds

Comparison & Analysis of Drones in Major Countries based on Self-Driving in IoT Environment (사물인터넷 환경에서 자율주행 기반의 주요국 드론 특성 비교/분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2020
  • The remarkable change in the automobile industry, which is a traditional industrial field, is now evolving into a form of moving toward autonomous functions rather than humans due to various convenience functions and automatic driving or autonomous driving technologies if the person was central when driving the car. This situation is expanding to various industries such as the aviation industry and the drone market, as well as the robot market. The drone market in the aviation industry is being used in various fields due to the unmanned nature of drone operation. Among them, military drones are secret and due to the specificity of technology, details are not disclosed, but as a collection of advanced technologies, they have played a key role in drone development. In this study, the current status of China and the European Union, including the United States, which are major competitors in the drone field, was investigated, and the technologies of major countries were compared and analyzed through the characteristics and operational specifications of the drones currently in operation.

Application and Performance Analysis of Double Pruning Method for Deep Neural Networks (심층신경망의 더블 프루닝 기법의 적용 및 성능 분석에 관한 연구)

  • Lee, Seon-Woo;Yang, Ho-Jun;Oh, Seung-Yeon;Lee, Mun-Hyung;Kwon, Jang-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.23-34
    • /
    • 2020
  • Recently, the artificial intelligence deep learning field has been hard to commercialize due to the high computing power and the price problem of computing resources. In this paper, we apply a double pruning techniques to evaluate the performance of the in-depth neural network and various datasets. Double pruning combines basic Network-slimming and Parameter-prunning. Our proposed technique has the advantage of reducing the parameters that are not important to the existing learning and improving the speed without compromising the learning accuracy. After training various datasets, the pruning ratio was increased to reduce the size of the model.We confirmed that MobileNet-V3 showed the highest performance as a result of NetScore performance analysis. We confirmed that the performance after pruning was the highest in MobileNet-V3 consisting of depthwise seperable convolution neural networks in the Cifar 10 dataset, and VGGNet and ResNet in traditional convolutional neural networks also increased significantly.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

The Developing of Analytical Statistics System for the Efficiency of Defense Management (국방경영 효율화를 위한 분석형 통계시스템 구축)

  • Lee, Jung-Man
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.87-94
    • /
    • 2015
  • Recently, management based on statistical data has become a big issue and the importance of the statistics has been emphasized for the management innovation in the defense area. However, the Military Management based on the statistics is hard to expect because of the shortage of the statistics in the military. There are many military information systems having great many data created in real time. Since the infrastructure for gathering data form the many systems and making statistics by using gathered data is not equipped, the usage of the statistics is poor in the military. The Analytical Defense Statistics System is designed to improve effectively the defense management in this study. The new system having the sub-systems of Data Management, Analysis and Service can gather the operational data from interlocked other Defense Operational Systems and produce Defense Statistics by using the gathered data beside providing statistics services. Additionally, the special function for the user oriented statistics production is added to make new statistics by handling many statistics and data. The Data Warehouse is considered to manage the data and Online Analytical Processing tool is used to enhance the efficiency of the data handling. The main functions of the R, which is a well-known analysis program, are considered for the statistical analysis. The Quality Management Technique is applied to find the fault from the data of the regular and irregular type. The new Statistics System will be the essence of the new technology like as Data Warehouse, Business Intelligence, Data Standardization and Statistics Analysis and will be helpful to improve the efficiency of the Military Management.

Analyses of the Patterns of the Synchronous and Asynchronous Social Media Usage in College e-Learning Settings (대학 이러닝 환경에서 실시간과 비실시간 소셜미디어 활용유형 차이분석)

  • Eom, Sang-Hyeon;Lim, Keol
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.27-34
    • /
    • 2017
  • As information technology has been developed in a rapid way, a lot of users get to be familiar with social media. Accordingly, the possibility of social media for educational use has increased. From the view point of learning, social media help learners make communities of practice that can lead to collective intelligence. In this study, two different types of social media, synchronous and asynchronous, were compared in terms of usage patterns in the e-learning settings of college level. Content analysis has figured out four factors: learning content, tasks and assignments, emotional communications, and chatting. There found to be a statistical differences in the postings in all of the factors except tasks and assignments. In the qualitative interviews, the participants told various usage patterns of synchronous and asynchronous social media. In sum, the learners generally preferred synchronous social media. Rather, asynchronous social media were mainly used for deep thinking and summarizing. Last, suggestions were made to improve educational environments for the learners in the digital and social media age.

Empirical Analysis of the Effects of Service Quality of the Smartphone App Store on Users' Repurchase Intention (스마트폰 앱 스토어의 서비스 품질이 재구매 의도에 미치는 요인에 관한 실증연구)

  • Lee, Myung Moo;Lee, Kun Chang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.1-18
    • /
    • 2015
  • Recent trends of mobile convergence has already brought about many changes in our digitally-powered society. Especially, taking advantage of strengths of existing mobile devices and smart phones have already been established as a primary standard in the business intelligence world. Such high-powered digital devices equipped with mobile convergence functions are getting more momentum as app stores are prevailing. Basically, the app stores are administered by smart phone manufacturers, creating a new business ecosystem among app developers and end-users. However, there are paucity of studies tackling an issue about how users' repurchase intention of the apps is influenced by the service qualities of the app stores. In this respect, this study aims to investigate the effect of app store service quality on users' satisfaction and repurchase intention. As the value of loyal customers is incomparably high in app commerce, winning customers' loyalty is vital to the success of app stores. In this study, a customer is defined as one who has purchased goods or services at least once from the app stores. The proposed research model includes a number of constructs such as app perceptions, customer service, perceived ease of use, design, promotion, perceived consumer risk and connectivity. Empirical results revealed that perceived consumer risk has a negative relationship with consumer's perceived repurchase intention. All the other variables-app perceptions, customer service, perceived ease of use, design, promotion, connectivity- are found to be positively related with the repurchase intentions.

Analysis of Effect of Surface Temperature Rise Rate of 72.5 Ah NCM Pouch-type Lithium-ion Battery on Thermal Runaway Trigger Time (72.5 Ah NCM계 파우치형 리튬이온배터리의 표면온도 상승률이 열폭주 발생시간에 미치는 영향 분석)

  • Lee, Heung-Su;Hong, Sung-Ho;Lee, Joon-Hyuk;Park, Moon Woo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.5
    • /
    • pp.1-9
    • /
    • 2021
  • With the convergence of the information and communication technologies, a new age of technological civilization has arrived. This is the age of intelligent revolution, known as the 4th industrial revolution. The 4th industrial revolution is based on technological innovations, such as robots, big data analysis, artificial intelligence, and unmanned transportation facilities. This revolution would interconnect all the people, things, and economy, and hence will lead to the expansion of the industry. A high-density, high-capacity energy technology is required to maintain this interconnection. As a next-generation energy source, lithium-ion batteries are in the spotlight today. However, lithium-ion batteries can cause thermal runaway and fire because of electrical, thermal, and mechanical abuse. In this study, thermal runaway was induced in 72.5 Ah NCM pouch-type lithium-ion batteries because of thermal abuse. The surface of the pouch-type lithium-ion batteries was heated by the hot plate heating method, and the effect of the rate of increase in the surface temperature on the thermal runaway trigger time was analyzed using Minitab 19, a statistical analysis program. The correlation analysis results confirmed that there existed a strong negative relationship between each variable, while the regression analysis demonstrated that the thermal runaway trigger time of lithium-ion batteries can be predicted from the rate of increase in their surface temperature.

Real Time SW Sizing Model for FP-Based Fintech Software Development Project (FP 기반의 핀테크 소프트웨어 개발 프로젝트 실시간 규모 산정 모델)

  • Koo, Kyung-Mo;Yoon, Byung-Un;Kim, Dong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.36-44
    • /
    • 2021
  • Estimation on SW Sizing applied to fintech is very difficult, a task requiring long time, it is difficult for client companies and developer companies to accurately calculate the size of software development. The size is generally estimated based on the experience of project managers and the general functional scoring method. In this paper, propose a model that can be applied to fintech development projects by quantitatively calculating the required functions from the user's point of view, measuring the scale, and calculating the scale in real time. Through the proposed model, the amount of work can be estimated prior to development and the size can be measured, and the M/M and the estimated quotation amount can be calculated based on the program list by each layer. In future studies, by securing size computation data on existing the Fintech Project in mass, research on accurate size computation would be required.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.

End-to-end Delay Guarantee in IEEE 802.1 TSN with Non-work conserving scheduler (비작업보존 스케줄러를 갖는 IEEE 802.1 TSN에서 단대단 지연시간 보장)

  • Joung, Jinoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.121-126
    • /
    • 2018
  • IEEE 802.1 TSN TG is developing standards for end-to-end delay bounds and zero packet loss based on Ethernet technology. We focus on packet forwarding techniques. TSN packet forwarding techniques can be classified into Synchronous and Asynchronous framework. Synchronous approach allocates fixed time period for a class, yet is complex for large networks. Asynchronous approach provides delay guarantee by regulator-scheduler pair, yet is unnecessarily complex, too. We propose network components for TSN Asynchronous architecture, which remove the complexity of maintaining flow state for regulation decisions. Despite such a simplicity, the proposed architecture satisfies the TSN's delay requirements provided the limited high priority traffic's maximum packet length.