• 제목/요약/키워드: National intelligence agency

Search Result 150, Processing Time 0.027 seconds

Development of wearable devices and mobile apps for fall detection and health management

  • Tae-Seung Ko;Byeong-Joo Kim;Jeong-Woo Jwa
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.370-375
    • /
    • 2023
  • As we enter a super-aged society, studies are being conducted to reduce complications and deaths caused by falls in elderly adults. Research is being conducted on interventions for preventing falls in the elderly, wearable devices for detecting falls, and methods for improving the performance of fall detection algorithms. Wearable devices for detecting falls of the elderly generally use gyro sensors. In addition, to improve the performance of the fall detection algorithm, an artificial intelligence algorithm is applied to the x, y, z coordinate data collected from the gyro sensor. In this paper, we develop a wearable device that uses a gyro sensor, body temperature, and heart rate sensor for health management as well as fall detection for the elderly. In addition, we develop a fall detection and health management system that works with wearable devices and a guardian's mobile app to improve the performance of the fall detection algorithm and provide health information to guardians.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Qualitative Research on Exploring Consideration Factors for Educational Use of ChatGPT (ChatGPT의 교육적 활용 고려 요소 탐색을 위한 질적 연구)

  • Hyeongjong Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.659-666
    • /
    • 2023
  • Among the tools based on generative artificial intelligence, the possibility of using ChatGPT is being explored. However, studies that have confirmed what factors should be considered when using it educationally based on learners' actual perceptions are insufficient. Through qualitative research method, this study was to derive consideration factors when using ChatGPT in the education. The results showed that there were five key factors as follows: critical thinking on generated information, recognizing it as a tool to support learning and avoiding dependent use, conducting prior training on ethical usage, generating clear and appropriate questions, and reviewing and synthesizing answers. It is necessary to develop an instructional design model that comprehensively composes the above elements.

A Bibliometric Comparative Analysis on the Applications of AI, IoT, and Big Data to Energy Efficiency

  • Yong Sauk Hau
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.287-296
    • /
    • 2024
  • Artificial intelligence (AI), the Internet of Things (IoT), and Big Data are playing important roles in improving or upgrading energy efficiency. Furthermore, their roles in energy efficiency are expected to become more and more essential. This study conducted a bibliometric comparative analysis on the features in the articles on the AI, the IoT, and the Big Data in energy efficiency by using the Web of Science database and compared the features in their trends in article publications, citations, countries, research areas, journals, and funding agencies from 2012 to 2022. This study attempted to make significant contributions by shedding new light on the following features. Among the AI, the IoT, and the Big Data in energy efficiency, the most articles were published and the most article citations were received in the AI in energy efficiency. China was found out to be the most leading country. Engineering and computer science were revealed to be the first research area. IEEE Access and IEEE Internet of Things were ranked with first journal. National Natural Science Foundation of China was the first research funding agency concerning the articles published in the AI, the IoT, and the Big Data in energy efficiency from 2012 to 2022.

Is Mr. AI more responsible? The effect of anthropomorphism in the moral judgement toward AI's decision making (AI의 의사결정에 대한 도덕판단에서 의인화가 미치는 영향 - 쌍 도덕 이론을 중심으로 -)

  • Yoon-Bin, Choi;Dayk, Jang
    • Korean Journal of Cognitive Science
    • /
    • v.33 no.4
    • /
    • pp.169-203
    • /
    • 2022
  • As artificial intelligence (AI) technology advances, the number of cases in which AI becomes an object or subject of moral judgment is increasing, and this trend is expected to accelerate. Although the area of AI in human society expands, relatively few studies have been conducted on how people perceive and respond to AI. Three studies examined the effect of the anthropomorphism of AI on its responsibility. We predicted that anthropomorphism would increase the responsibility perception, and perceived agency and perceived patiency for AI would mediate this effect. Although the manipulation was not effective, multiple analyses confirmed the indirect effect of perceived patiency. In contrast, the effect of perceived agency of AI was somewhat mixed, which makes the hypothesis partially supported by the overall result. This result shows that for the moral status of artificial agents, perceived patiency is relatively more critical than perceived agency. These results support the organic perspective on the moral status that argues the importance of patiency, and show that patiency is more important than agency in the anthropomorphism related study of AI and robots.

Changes of The Epidemiologic Competences after Introductory Course of The Korea - Field Epidemiologist Training Program(K-FETP) in Epidemiologic Intelligence Servise(EIS) Officers (한국 역학조사관 기본교육(K-FETP) 전후 역량 평가)

  • Kim, Eun-Young;Lee, Moo-Sik;Lee, Tae-Jun;Lee, Kwan;Nam, Hae-Sung;Lee, Ju-Hyoung;Kim, Hong-Bin;Chun, Byung-Chul;Lee, Sang-Won;Lee, Dong-Han;Kim, Hee-Jung;Kwon, Sung-Whe;Yoon, Na-Bi;Shin, Moon-Chul;Lim, Mee-Jee
    • Journal of agricultural medicine and community health
    • /
    • v.47 no.2
    • /
    • pp.78-89
    • /
    • 2022
  • 목적: 이 연구는 2019학년도 역학조사관 입문교육 과정에 참여한 29명의 수습과정생에게 참여형 자기주도 학습 역학조사관 연수 프로그램(FETP)의 효과와 만족도 등 역량 변화를 분석해 그 결과를 향후 과정 개발의 참고 자료로 활용하고자 하였다. 방법: 교육 프로그램의 만족도와 교육 후 모듈에 대한 역량 변화를 평가하는 연구가 수행되었다. 만족도와 역량의 차이 비교는 크루스칼 왈리스 검정(Kruskal-Wallis test)를 실시하였고, 역량의 차이는 윌콕슨 부호순위검정(Wilcoxon signed rank test)에 의해 이루어 졌다. 결과: 2019년 FETP에 참여한 역학조사관 중 여성은 48.3% 였으며, 40세 미만은 9.4% 였다. 역학조사관 입문교육과정 모듈(역학조사, 보건통계 및 정보통계, 감염병 국가 체계, 감염병 질환 감시 체계, 진단 및 실험실 검사, 생물 안전 및 관리, 주요 감염성질환 관리와 조사, 커뮤니케이션, 협동과 리더십, 일반과정)별 만족도는 실무적 도움, 전문성, 기능, 태도 등에서 4점(5점 만점)을 초과하였고, 전체 4.2±0.21(5점 만점)점으로 높은 수준이였다, 모듈의 교육훈련 전후 평균 점수는 2.25±0.91, 3.68±0.63점 등으로 유의한 향상이 있었으며, 모든 모듈 및 하위 주제들도 유의한 향상이 있었다(p<0.001). 그 중에서 현장역학조사 경험이 가장 높은 변화가 있었고, 표본 수집과 실무가 가장 낮은 역량 변화가 있었다. 결론: 2019년 진행된 입문교육 과정은 수료 후 학생들의 역량은 개선되었고, 만족도는 높은 편이었다. 참여형 자기주도학습의 촉진은 역량을 향상시킬 뿐만 아니라 보건 종사자들의 자신감을 높일 수 있었다.

A Comparative Study on Artificial in Intelligence Model Performance between Image and Video Recognition in the Fire Detection Area (화재 탐지 영역의 이미지와 동영상 인식 사이 인공지능 모델 성능 비교 연구)

  • Jeong Rok Lee;Dae Woong Lee;Sae Hyun Jeong;Sang Jeong
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.968-975
    • /
    • 2023
  • Purpose: We would like to confirm that the false positive rate of flames/smoke is high when detecting fires. Propose a method and dataset to recognize and classify fire situations to reduce the false detection rate. Method: Using the video as learning data, the characteristics of the fire situation were extracted and applied to the classification model. For evaluation, the model performance of Yolov8 and Slowfast were compared and analyzed using the fire dataset conducted by the National Information Society Agency (NIA). Result: YOLO's detection performance varies sensitively depending on the influence of the background, and it was unable to properly detect fires even when the fire scale was too large or too small. Since SlowFast learns the time axis of the video, we confirmed that detects fire excellently even in situations where the shape of an atypical object cannot be clearly inferred because the surrounding area is blurry or bright. Conclusion: It was confirmed that the fire detection rate was more appropriate when using a video-based artificial intelligence detection model rather than using image data.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Assessment of Possibility for Unaccessible Areas Digital Mapping Using FDB (FDB를 이용한 비접근지역의 수치지도 제작 가능성 평가)

  • Kang, Joon-Mook;Lee, Byung-Gul;Lim, Young-Bin;Jang, Young-Il
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.341-344
    • /
    • 2007
  • National Geospatial-Intelligence Agency(NGA) developed VPF in mid 1980 to digitalize military geospatial information. However, because VPF is very complicated system and was severly inefficient in producing, maintaining, and managing the data, VPF was required to be replaced by more efficient data format. These requests resulted in an integrated schema, and eventually VPF. The main idea of using FDB in the production of digital map of non-accessible area is to increase the accuracy. This research focuses on the production of high accuracy digital map by utilizing the FDB. The accuracy of digital map by FDB and by DGN was individually compared with 1m CIB imagery of the Korean peninsula. By analyzing 38 check points based on CIB, DGN showed RMSE of 52m X axis and 49m Y axis. FDB showed 15m in X axis and 13m in Y axis. These results show that the digital map produced using FDB has much higher accuracy than DGN based digital map.

  • PDF

A Study on the Improvement of Regulations on Economic Counterintelligence

  • Bongchul, Kim;Minsub, Shim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.427-433
    • /
    • 2022
  • Although the National Intelligence Service Act has been amended considering the growing importance of economic counterintelligence, a clear interpretation of certain provisions and improvement of the effectiveness of economic counterintelligence are required. This article presents some suggestions for regulations on economic counterintelligence. Firstly, the meaning of the term "disturbance of economic order in connection with foreign powers" will become clear by interpreting it with the terms of the Counterintelligence Duty Regulation and by setting categories referring to the U. S. regulations. Secondly, counterintelligence authorities' request for cooperation may be reinforced by amending relevant regulations or by applying a special procedure for the acquisition of data. Finally, strengthened punishment for activities in connection with foreign powers may improve the efficiency of counterintelligence. For these reasons, this paper aims to present a direction for the future, focusing on this new economic counterintelligence.