• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.027 seconds

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

The Factors Influencing Value Awareness of Personalized Service and Intention to Use Smart Home: An Analysis of Differences between "Generation MZ" and "Generation X and Baby Boomers" (스마트홈 개인화 서비스에 대한 가치 인식 및 사용의도에의 영향 요인: "MZ세대"와 "X세대 및 베이비붐 세대" 간 차이 분석)

  • Sang-Keul Lee;Ae Ri Lee
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.201-223
    • /
    • 2021
  • Smart home is an advanced Internet of Things (IoT) service that enhances the convenience of human daily life and improves the quality of life at home. Recently, with the emergence of smart home products and services to which artificial intelligence (AI) technology is applied, interest in smart home is increasing. To gain a competitive edge in the smart home market, companies are providing "personalized service" to users, which is a key service that can promote smart home use. This study investigates the factors affecting the value awareness of personalized service and intention to use smart home. This research focuses on four-dimensional motivated innovativeness (cognitive, functional, hedonic, and social innovativeness) and privacy risk awareness as key factors that influence the value awareness of personalized service of smart home. In particular, this study conducts a comparative analysis between the generation MZ (young people in late teens to 30s), who are showing socially differentiated characteristics, and the generation X and baby boomers in 40s to 50s or older. Based on the analysis results, this study derives the distinctive characteristics of generation MZ that are different from the older generation, and provides academic and practical implications for expanding the use of smart home services.

The Propose a Legislation Bill to Apply Autonomous Cars and the Study for Status of Legal and Political Issues (제4차 산업혁명 시대의 자율주행자동차 상용화를 위한 안정적 법적 기반을 위한 법정책적 연구 - 자율주행자동차 특별법 제정(안)을 중심으로 -)

  • Kang, Sun Joon;Won, Yoo Hyung;Kim, Min Ji
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.1
    • /
    • pp.151-200
    • /
    • 2018
  • At the Davos Forum in 2016, the Fourth Industrial Revolution, a reference to cloud Schwab, is dramatically changing our lives, and at its height, self-driving cars are emerging as the talk of the day. But there are still many hurdles to overcome before the nation can successfully introduce and establish self-driving cars. In particular, it is necessary to change the paradigm of the legal system centered on human beings to one that includes artificial intelligence. The stable operation of the self-driving car era requires drastic changes to the people-centric legislation system. That is, it is necessary to collect information on the total number of drivers of self-driving cars (what is available), general vehicles on general roads, civil and criminal liability issues in the event of traffic accidents, and collection of insurance problems concerning autonomous driving vehicles. In this study, a separate bill was proposed to address the various legal issues arising from the operation of self-driving cars from a legislative perspective by considering the domestic laws related to road transport, the current state of legislation on foreign soil and legal issues related to self-driving cars.

The Philosophical Perspective on Discussion of Human Body in Digital Media Era - focused on new media art cases (디지털 미디어 시대의 신체담론에 관한 철학적 고찰 - 뉴미디어 아트에 나타난 신체담론을 중심으로)

  • Kah, Eun-Young;Kim, Jong-Deok
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.109-114
    • /
    • 2008
  • We have long kept our Cartesian tradition in which Mind privileges over Body; the invention of printing technology has accelerated the tradition in which the intelligence and legibility of media were considered as a higher human value. However, the development of media and technology are supporting the multisensory mechanisms of the body as it was in preliterate era when we communicated with our whole bodily experiences. The development and spread of mass-media and new technologies have broaden the boundary of human sensory that are largely dominated by visual information and expanded it to auditory, olfactory and even gustatory sensation. Since 1960's, some philosophers and artists have recognized the human body as a subjective matter, starting the movement in which the body plays a role as an essential factor in study of human perception and cognition, aesthetics in art, and sociology, and the changed perspectives are practiced vigorously in the field of new media art; the theory of Maurice Merleau-Ponty who clarified the body as a general means for the body's possession of world, so that recognize the importance of cognition of one's body and approved the embodiment could be applied and practiced here. Therefore, we discuss how Merleau-Ponty's philosophical theory can be practiced and how McLuhan's perspective could be applied on the notion of body's extension in media by analysing some new media art cases.

  • PDF

The Effect of Virtual Human Lecturer's Human Likeness on Educational Content Satisfaction: Focused on the Theory of Experiential Economy (가상 휴먼 강사의 인간 유사도가 교육 콘텐츠 만족감에 미치는 영향: 체험경제이론을 중심으로)

  • Gong, Li;Bae, Sujin;Kwon, Ohbyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.524-539
    • /
    • 2022
  • With the advent of generative artificial intelligence technology, it became possible to create a virtual human, and produce a lecture video only with textual information. It is expected that the virtual human will enhance the efficient production of educational contents and the student's entertainment experience and satisfaction. However, there have been still few studies that have demonstrated the process of how virtual human technology reaches students' satisfaction. Therefore, the purpose of this study is to empirically examine whether the human likeness, which is the main characteristic of a virtual human based on Uncanny Valley theory, affects human experience and satisfaction. In particular, human likeness of the Uncanny Valley theory was subdivided into human likeness in the visual and verbal dimensions, and the process of reaching satisfaction was understood based on the experience economy model. In particular, human similarity in Uncanny Valley theory was classified as similarity in the visual and language levels, and the process of reaching satisfaction based on the experiential economic model was analyzed with a partial least squares structure model equation (PLS-SEM). The survey was conducted online for a panel of office workers at a specialized research institution in China. The results indicate that both the visual and verbal human likeness had a positive effect on experience economy factors (education, entertainment, esthetic, escape), and then these experiential factors had a significant effect on satisfaction. The results also provide some suggestions to consider when designing educational contents by virtual human.

A Study on the System for AI Service Production (인공지능 서비스 운영을 위한 시스템 측면에서의 연구)

  • Hong, Yong-Geun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.323-332
    • /
    • 2022
  • As various services using AI technology are being developed, much attention is being paid to AI service production. Recently, AI technology is acknowledged as one of ICT services, a lot of research is being conducted for general-purpose AI service production. In this paper, I describe the research results in terms of systems for AI service production, focusing on the distribution and production of machine learning models, which are the final steps of general machine learning development procedures. Three different Ubuntu systems were built, and experiments were conducted on the system, using data from 2017 validation COCO dataset in combination of different AI models (RFCN, SSD-Mobilenet) and different communication methods (gRPC, REST) to request and perform AI services through Tensorflow serving. Through various experiments, it was found that the type of AI model has a greater influence on AI service inference time than AI machine communication method, and in the case of object detection AI service, the number and complexity of objects in the image are more affected than the file size of the image to be detected. In addition, it was confirmed that if the AI service is performed remotely rather than locally, even if it is a machine with good performance, it takes more time to infer the AI service than if it is performed locally. Through the results of this study, it is expected that system design suitable for service goals, AI model development, and efficient AI service production will be possible.

SIEM System Performance Enhancement Mechanism Using Active Model Improvement Feedback Technology (능동형 모델 개선 피드백 기술을 활용한 보안관제 시스템 성능 개선 방안)

  • Shin, Youn-Sup;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.896-905
    • /
    • 2021
  • In the field of SIEM(Security information and event management), many studies try to use a feedback system to solve lack of completeness of training data and false positives of new attack events that occur in the actual operation. However, the current feedback system requires too much human inputs to improve the running model and even so, those feedback from inexperienced analysts can affect the model performance negatively. Therefore, we propose "active model improving feedback technology" to solve the shortage of security analyst manpower, increasing false positive rates and degrading model performance. First, we cluster similar predicted events during the operation, calculate feedback priorities for those clusters and select and provide representative events from those highly prioritized clusters using XAI (eXplainable AI)-based event visualization. Once these events are feedbacked, we exclude less analogous events and then propagate the feedback throughout the clusters. Finally, these events are incrementally trained by an existing model. To verify the effectiveness of our proposal, we compared three distinct scenarios using PKDD2007 and CSIC2012. As a result, our proposal confirmed a 30% higher performance in all indicators compared to that of the model with no feedback and the current feedback system.

A Study on Developing Low Altitude Multi-layer Air Defense System to Protect Megacities in the Korean Peninsula (한국형 메가시티 저고도 다중방공체계 구축 방안)

  • Sin, Ui-Cheol;Cho, Sang Keun;Park, Sung Jun;Sim, Jun Hak;Koo, Ja Hong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.393-398
    • /
    • 2022
  • Megacities of the Repulic of Korea(ROK) will have increased by urbanization and the fourth industrial revolution. Mgacities are absolutely the opportunity factor to make human life enriched. Simultaneously, those are the challenge foctor considering the crucial conventional threat such as massive artillery and multiple rocket launcher from the North Korea. Israel that has faced the geopolitical situation of ROK developed the Multi-layer air defense system to offset the low altitude threat from the neighboring nations. As a result, Israel substantially removed plenty of Hamas' rockes and suicidal drones in 2021. Applying Israel's concept, North Korea's low altitude threat toward the ROK's megacities can effectively be eliminated. Furthermore, this Multi-layer air defense system can be a game-changer that gets rid of the low and high altitude threat from North Korea and neighboring nations with both hyperconnected sensor-C2-shooter and artificial intelligence. Through this approach, the ROK will be able to achieve the prosperity and prowth of nation at the center of Megacities concentrated on PMESII(Politics, Military, Economy, Society, Information, and Infrastructure) factors.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.