• Title/Summary/Keyword: Intelligent Service

Search Result 1,826, Processing Time 0.026 seconds

A Study on the Actual Condition of the Fourth Industrial Revolution and Application of Landscape Architecture (4차 산업혁명의 실태와 조경학 분야 적용방안 연구)

  • Lee, Jong-Sung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.1
    • /
    • pp.68-75
    • /
    • 2019
  • This study aims to look at the application methods of landscape architecture in response to the 4th Industrial Revolution. The results of the analysis of trends in the 4th Industrial Revolution and the subsequent search for application methods to the field of landscape architecture are as follows. First, the 4th Industrial Revolution means innovative change based on digital technology and seeks to create value based on intelligent information technology, and continuous growth is being made through innovation. This requires expertise to collect large amounts of information and creatively rework it, and a strategy to flexibly cope with changes in the times. Second, the status of technological use in response to the 4th Industrial Revolution in the field of landscape architecture is generalizing the establishment of precise analysis results such as survey technology and global mapping using drones, three-dimensional design simulation, and VR. In the field of traditional landscape architecture, efforts are made to obtain accurate fact-finding data on landscape site components. Third, the application methods in the field of landscape science according to the 4th Industrial Revolution in the future are required to supply precision technology and supply programs in the technology sector, and to provide a shared platform. In addition, a systemically standardized process will need to be established for this. In addition, educational efforts should be continued to professional manpower training and provide economic support for the development of technologies.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

The Effect of Changes in Airbnb Host's Marketing Strategy on Listing Performance in the COVID-19 Pandemic (COVID-19 팬데믹에서 Airbnb 호스트의 마케팅 전략의 변화가 공유성과에 미치는 영향)

  • Kim, So Yeong;Sim, Ji Hwan;Chung, Yeo Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.1-27
    • /
    • 2021
  • The entire tourism industry is being hit hard by the COVID-19 as a global pandemic. Accommodation sharing services such as Airbnb, which have recently expanded due to the spread of the sharing economy, are particularly affected by the pandemic because transactions are made based on trust and communication between consumer and supplier. As the pandemic situation changes individuals' perceptions and behavior of travel, strategies for the recovery of the tourism industry have been discussed. However, since most studies present macro strategies in terms of traditional lodging providers and the government, there is a significant lack of discussion on differentiated pandemic response strategies considering the peculiarity of the sharing economy centered on peer-to-peer transactions. This study discusses the marketing strategy for individual hosts of Airbnb during COVID-19. We empirically analyze the effect of changes in listing descriptions posted by the Airbnb hosts on listing performance after COVID-19 was outbroken. We extract nine aspects described in the listing descriptions using the Attention-Based Aspect Extraction model, which is a deep learning-based aspect extraction method. We model the effect of aspect changes on listing performance after the COVID-19 by observing the frequency of each aspect appeared in the text. In addition, we compare those effects across the types of Airbnb listing. Through this, this study presents an idea for a pandemic crisis response strategy that individual service providers of accommodation sharing services can take depending on the listing type.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

What factors drive AI project success? (무엇이 AI 프로젝트를 성공적으로 이끄는가?)

  • KyeSook Kim;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.327-351
    • /
    • 2023
  • This paper aims to derive success factors that successfully lead an artificial intelligence (AI) project and prioritize importance. To this end, we first reviewed prior related studies to select success factors and finally derived 17 factors through expert interviews. Then, we developed a hierarchical model based on the TOE framework. With a hierarchical model, a survey was conducted on experts from AI-using companies and experts from supplier companies that support AI advice and technologies, platforms, and applications and analyzed using AHP methods. As a result of the analysis, organizational and technical factors are more important than environmental factors, but organizational factors are a little more critical. Among the organizational factors, strategic/clear business needs, AI implementation/utilization capabilities, and collaboration/communication between departments were the most important. Among the technical factors, sufficient amount and quality of data for AI learning were derived as the most important factors, followed by IT infrastructure/compatibility. Regarding environmental factors, customer preparation and support for the direct use of AI were essential. Looking at the importance of each 17 individual factors, data availability and quality (0.2245) were the most important, followed by strategy/clear business needs (0.1076) and customer readiness/support (0.0763). These results can guide successful implementation and development for companies considering or implementing AI adoption, service providers supporting AI adoption, and government policymakers seeking to foster the AI industry. In addition, they are expected to contribute to researchers who aim to study AI success models.

Study on User Characteristics based on Conversation Analysis between Social Robots and Older Adults: With a focus on phenomenological research and cluster analysis (소셜 로봇과 노년층 사용자 간 대화 분석 기반의 사용자 특성 연구: 현상학적 분석 방법론과 군집 분석을 중심으로)

  • Na-Rae Choi;Do-Hyung Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.211-227
    • /
    • 2023
  • Personal service robots, a type of social robot that has emerged with the aging population and technological advancements, are undergoing a transformation centered around technologies that can extend independent living for older adults in their homes. For older adults to accept and use social robot innovations in their daily lives on a long-term basis, it is crucial to have a deeper understanding of user perspectives, contexts, and emotions. This research aims to comprehensively understand older adults by utilizing a mixed-method approach that integrates quantitative and qualitative data. Specifically, we employ the Van Kaam phenomenological methodology to group conversations into nine categories based on emotional cues and conversation participants as key variables, using voice conversation records between older adults and social robots. We then personalize the conversations based on frequency and weight, allowing for user segmentation. Additionally, we conduct profiling analysis using demographic data and health indicators obtained from pre-survey questionnaires. Furthermore, based on the analysis of conversations, we perform K-means cluster analysis to classify older adults into three groups and examine their respective characteristics. The proposed model in this study is expected to contribute to the growth of businesses related to understanding users and deriving insights by providing a methodology for segmenting older adult s, which is essential for the future provision of social robots with caregiving functions in everyday life.

Developing a New Algorithm for Conversational Agent to Detect Recognition Error and Neologism Meaning: Utilizing Korean Syllable-based Word Similarity (대화형 에이전트 인식오류 및 신조어 탐지를 위한 알고리즘 개발: 한글 음절 분리 기반의 단어 유사도 활용)

  • Jung-Won Lee;Il Im
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.267-286
    • /
    • 2023
  • The conversational agents such as AI speakers utilize voice conversation for human-computer interaction. Voice recognition errors often occur in conversational situations. Recognition errors in user utterance records can be categorized into two types. The first type is misrecognition errors, where the agent fails to recognize the user's speech entirely. The second type is misinterpretation errors, where the user's speech is recognized and services are provided, but the interpretation differs from the user's intention. Among these, misinterpretation errors require separate error detection as they are recorded as successful service interactions. In this study, various text separation methods were applied to detect misinterpretation. For each of these text separation methods, the similarity of consecutive speech pairs using word embedding and document embedding techniques, which convert words and documents into vectors. This approach goes beyond simple word-based similarity calculation to explore a new method for detecting misinterpretation errors. The research method involved utilizing real user utterance records to train and develop a detection model by applying patterns of misinterpretation error causes. The results revealed that the most significant analysis result was obtained through initial consonant extraction for detecting misinterpretation errors caused by the use of unregistered neologisms. Through comparison with other separation methods, different error types could be observed. This study has two main implications. First, for misinterpretation errors that are difficult to detect due to lack of recognition, the study proposed diverse text separation methods and found a novel method that improved performance remarkably. Second, if this is applied to conversational agents or voice recognition services requiring neologism detection, patterns of errors occurring from the voice recognition stage can be specified. The study proposed and verified that even if not categorized as errors, services can be provided according to user-desired results.

A Study on the Utilization of ESG for Reducing Carbon Emissions in the Building Sector and Development Directions (건물부문의 탄소배출량 절감을 위한 ESG의 활용방안과 발전방향)

  • Sang Duck Moon
    • Environmental and Resource Economics Review
    • /
    • v.31 no.4
    • /
    • pp.801-824
    • /
    • 2022
  • Recently, United Nations found that 38% of global carbon emissions are generated in the building sector, surpassing other industries (32%) and transportation (23%), and ESG is actively used as a way to reduce carbon emissions in the building sector, led by overseas advanced countries. In Korea, as the National Pension Service announced "Consider ESG with more than 50% of investment assets" this year, the move to introduce ESG in the building sector is accelerating, centering on construction companies and asset management companies. However, as the domestic ESG evaluation system is still mainly focused on corporate governance and social responsibility, interest in the environmental sector is lagging behind that of advanced countries. As ESG in the building sector is expected to grow rapidly over the next 10 years, I would like to suggest the following development directions. The first is the expansion of the incentive system. In order for the government to successfully implement policies related to ESG in the building sector, incentive system such as tax reduction and building standards should be expanded further than now in addition to negative systems such as rent restrictions and punishment taxes due to regulatory violations. Second, standardized ESG standards are established. Rather than creating an independent Korean ESG standard that is far from global standards, it is necessary to organize the common parts of global standards and evaluation methods and create and provide guidelines in the form of standard textbooks that can be used equally by all stakeholders. Third, it is an effort to link ESG in the building sector with Digital Transformation(DX). This is because actual energy savings and carbon emission reduction can be realized only when the operation method of the building sector, which is operated mainly by manpower, is digitalized and converted to an intelligent way.

A study on the development of a ship-handling simulation system based on actual maritime traffic conditions (선박조종 시뮬레이터를 이용한 연안 해역 디지털 트윈 구축에 연구)

  • Eunkyu Lee;Jae-Seok Han;Kwang-Hyun Ko;Eunbi Park;Kyunghun Park;Seong-Phil Ann
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.200-201
    • /
    • 2023
  • Digital twin technology is used in various fields as a method of creating a virtual world to minimize the cost of solving problems in the real world, and is also actively used in the maritime field, such as large-scale systems such as ships and offshore plants. In this paper, we tried to build a digital twin of coastal waters using a ship-handling simulator. The digital twin of the coastal waters developed in this way can be used to safely manage Korea's coastal waters, where maritime traffic is complicated, by providing a actual maritime traffic data. It can be usefully used to develop and advance technologies related to maritime autonomous surface ships and intelligent maritime traffic information services in coastal waters. In addition, it can be used as a 3D-based monitoring equipment for areas where physical monitoring is difficult but real-time maritime traffic monitoring is necessary, and can provide functions to safely manage maritime traffic situations such as aerial views of ports/control areas, bridge views/blind sector views of ships in operation.

  • PDF

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.