• Title/Summary/Keyword: Intelligence information technology

Search Result 1,945, Processing Time 0.029 seconds

Collective Intelligence and Human Decision Bias (집단지성(Collective Intelligence)과 의사결정의 편향성)

  • Han, Joo-Hee;Shin, Kyung-shik;Chai, Sangmi
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.113-122
    • /
    • 2015
  • Collective intelligence can be an influential factor of decision-making based on collaboration and information exchange between individuals. Our study explores whether collective intelligence can mitigate the loss aversion effect, bias and error in human judgment, and collective intelligence in online communities can reduce the loss aversion effect. Our community settings display both individual-level and group-level loss aversion effect, investigate effective collective intelligence characteristics like investment commitment, participant experience. Using a multi-method approach our research comprises a web-based experiment with 100 participants investing 3 situations from a real-world community, data from a survey measuring loss aversion behavior of participants. The results suggest the loss aversion effect mitigates under the online-circumstance. Overall, our results suggest that, while collective intelligence mitigates the loss aversion effect, participants do not transfer these results to other settings.

Disapproval Judgment System of Research Fund Execution Details Based on Artificial Intelligence

  • Kim, Yongkuk;Juan, Tan;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.142-147
    • /
    • 2021
  • In this paper, we propose an intelligent research fund management system that applies artificial intelligence technology to an integrated research fund management system. By defining research fund management rules as work rules, a detection model learned using deep learning is designed, through which the disapproval status is presented for each research fund usage history. The disapproval detection system of the RCMS implemented in this study predicts whether the newly registered usage details are recognized or disapproved using an artificial intelligence model designed based on the use of an 8.87 million research fund registered in the RCMS. In addition, the item-detail recommendation system described herein presents the usage details according to the usage history item newly registered by the artificial intelligence model through a correlation between the research cost usage details and the item itself. The accuracy of the recommendation was shown to be 97.21%.

Ambient Intelligence in Distributed Modular Systems

  • Ngo Trung Dung;Lund Henrik Hautop
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.421-426
    • /
    • 2004
  • Analyzing adaptive possibilities of agents in multi-agents system, we have discovered new aspects of ambient intelligence in distributed modular systems using intelligent building blocks (I-BLOCKS) [1]. This paper describes early scientific researches related to technical design, applicable experiments and evaluation of adaptive processing and information interaction among I-BLOCKS allowing users to easily develop ambient intelligence applications. The processing technology presented in this paper is embedded inside each DUPLO1 brick by microprocessor as well as selected sensors and actuators in addition. Behaviors of an I-BLOCKS modular structure are defined by the internal processing functionality of each I-Blocks in such structure and communication capacities between I-BLOCKS. Users of the I-BLOCKS system can do 'programming by building' and thereby create specific functionalities of a modular structure of intelligent artefacts without the need to learn and use traditional programming language. From investigating different effects of modem artificial intelligence, I-BLOCKS we have developed might possibly contain potential possibilities for developing applications in ambient intelligence (AmI) environments. To illustrate these possibilities, the paper presents a range of different experimental scenarios in which I-BLOCKS have been used to set-up reconfigurable modular systems. The paper also reports briefly about earlier experiments of I-BLOCKS in different research fields, allowing users to construct AmI applications by a just defined concept of modular artefacts [3].

  • PDF

A Study on Artificial Intelligence Learning Data Generation Method for Structural Member Recognition (구조부재 인식을 위한 인공지능 학습데이터 생성방법 연구)

  • Yoon, Jeong-Hyun;Kim, Si-Uk;Kim, Chee-Kyeong
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.229-230
    • /
    • 2022
  • With the development of digital technology, construction companies at home and abroad are in the process of computerizing work and site information for the purpose of improving work efficiency. To this end, various technologies such as BIM, digital twin, and AI-based safety management have been developed, but the accuracy and completeness of the related technologies are insufficient to be applied to the field. In this paper, the learning data that has undergone a pre-processing process optimized for recognition of construction information based on structural members is trained on an existing artificial intelligence model to improve recognition accuracy and evaluate its effectiveness. The artificial intelligence model optimized for the structural member created through this study will be used as a base technology for the technology that needs to confirm the safety of the structure in the future.

  • PDF

Development of Rotating Equipment Anomaly Detection Algorithm based-on Artificial Intelligence (인공지능 기반 회전기기 이상탐지 알고리즘 개발)

  • Jeon, Yechan;Lee, Yonghyun;Kim, Dong-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.57-60
    • /
    • 2021
  • 본 논문에서는 기지 설비 중 주요 회전기기인 펌프의 이상탐지 알고리즘을 제안한다. 현재 인공지능을 활용하여 생산현장을 혁신하고자 하는 시도가 진행되고 있으나 외산 솔루션에 대한 의존도가 높은 것에 비해 국내 실정에 맞지 않는 경우가 많다. 이에 따라, 선행 연구를 통해 국내 실정에 맞는 인공지능 기술 도입이 필요하다. 본 연구에서는 VAE(Variational Auto Encoder) 알고리즘을 활용해 회전기기의 고장을 진단하는 알고리즘을 개발하였다. 본 연구 수행을 통한 회전기기의 고장 예지·진단 시스템 개발로 설비의 이상 징후 포착, 부품의 교환 시기 등 보수 일정을 예측하고 최종적으로 이를 통한 설비 가동의 효율 증대와 에너지 비용 감소의 효과를 기대한다.

  • PDF

Artificial Intelligence-based Crack Segmentation Algorithm for Safety diagnosis of old buildings (노후 건축물 안전진단을 위한 AI기반 균열 구획화 알고리즘)

  • Hee Ju Seo;Byeong Il Hwang;Dong Ju Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.13-14
    • /
    • 2023
  • 집중 안전 점검의 대상인 노후 건축물에서 균열은 건물의 안전도를 점검할 수 있는 지표이다. 안전 점검에 드론을 활용하면서 고해상도의 드론 기반 균열 이미지 수집이 가능해졌고, 육안이 아닌 AI기반으로 균열을 탐지, 구획화할 수 있다. 본 연구에서는 주변 사물과 배경에 구애받지 않고 안전 점검이 가능한 구획화 알고리즘을 제안한다. METU와 POC데이터셋을 가공하여 데이터셋을 구축하고, 이를 바탕으로 ResNet50을 통해 균열과 유사한 배경을 분류하였으며, 균열 구획화 모델을 선정하여 DesneNet201-UNet++으로 mIoU 82.27%를 달성하였다. 본 연구는 노후 건축물 안전 점검에 필요한 균열 폭 추정에 도움이 될 것으로 기대된다.

  • PDF

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

A Study on the Motivation of Artificial Intelligence Speaker (인공지능 스피커 사용 동기 형성에 관한 연구)

  • Lim, Yangwhan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.55-67
    • /
    • 2019
  • In this study, I researched whether consumers would adopt artificial intelligence speakers. A study was conducted on the motivations that arise when consumers want to use artificial intelligence speakers. Key motivational factors include needs and wants, and emotion is also included in the hypothesis as influencing the intended use. These factors have modeled the motivational process in which consumers want to use artificial intelligence speakers. In the empirical study, the survey was conducted and the survey data was analyzed by applying the method of analysis of the structural equation model. As a result of empirical research, consumers' expectations to meet their general needs for artificial intelligence speakers affected their expectations to meet their wants and their favorable perceptions. And consumers' expectations of meeting their quasi-desire for artificial intelligence speakers have affected their expectations of meeting the wants and affected their perception of favorability. Finally, consumers' expectations for satisfying their wants and their perception of favorability affected their intention to use artificial intelligence speakers. The implications of this study is that it helps to formulate strategies for information technology products with combined functionality. The specific components of motivation can play an important role in increasing consumers' intention to use artificial intelligence speakers.

Adopting e-Government Services in Less Developed Countries According to the Characteristics of Business Intelligence: (Sudan as a model)

  • Adrees, Mohmmed S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.204-212
    • /
    • 2022
  • In this paper, a contribution is presented covering the data set in improving and developing electronic services provided to citizens through e-government services based on business intelligence in government agencies in the Republic of Sudan. The Business Intelligence Concept Survey was conducted from the perceptions of information department employees in government agencies. The survey was conducted from April to June 2021 using questionnaires. The dataset contains responses about the factors that influence the use of business intelligence and the barriers and limitations to the use of business intelligence. A five-point Likert scale was used to analyze the quantitative data. The opportunities and challenges associated with it were also discussed and explored. As evidenced by the results, the information department employees agree that business intelligence improves the government decision-making process, which helps decision makers and decision-makers to find alternatives and opportunities that contribute to making more accurate and timely decisions. The results also indicate that creating the infrastructure for applying business intelligence in the e-government work model contributes to the successful implementation of business intelligence in Sudan.

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.