• Title/Summary/Keyword: National intelligence agency

Search Result 160, Processing Time 0.02 seconds

Smart Tourism Information System and IoT Data Collection Devices for Location-based Tourism and Tourist Safety Services

  • Ko, Tae-Seung;Kim, Byeong-Joo;Jwa, Jeong-Woo
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.310-316
    • /
    • 2022
  • The smart tourism service provides services such as travel planning and tour guides to tourists using key technologies of the 4th industrial revolution, such as the Internet of Things, communication infrastructure, big data, artificial intelligence, AR/VR, and drones. We are developing smart tourism services such as recommended travel products, my travel itinerary, tourism information, and chatbots for tourists through the smart tourism app. In this paper, we develop a smart tourism service system that provides real-time location-based tourism information and weather information to tourists. The smart tourism service system consists of a smart tourism app, a smart tourism information system, and an IoT data collection device. The smart tourism information system receives weather information from the IoT data collection device installed in the tourist destination. The location-based smart tourism service is provided as a smart tourism app in the smart tourism information system according to the Beacon's UUID in the IoT data collection device. The smart tourism information system stores the Beacon's UUIDs received from tourists and provides a safe hiking service for tourists.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

A Study on the Artificial Intelligence (AI) Training Data Quality: Fuzzy-set Qualitative Comparative Analysis (fsQCA) Approach (인공지능 학습용 데이터 품질에 대한 연구: 퍼지셋 질적비교분석)

  • Hyunmok Oh;Seoyoun Lee;Younghoon Chang
    • Information Systems Review
    • /
    • v.26 no.1
    • /
    • pp.19-56
    • /
    • 2024
  • This study is empirical research to enhance understanding of AI (artificial intelligence) training data project in South Korea. It primarily focuses on the various concerns regarding data quality from policy-executing institutions, data construction companies, and organizations utilizing AI training data to develop the most reliable algorithm for society. For academic contribution, this study suggests a theoretical foundation and research model for understanding AI training data quality and its antecedents, as well as the unique data and ethical aspects of AI. For this purpose, this study proposes a research model with important antecedents related to AI training data quality, such as data attribute factors, data building environmental factors, and data type-related factors. The study collects 393 sample data from actual practitioners and personnel from companies building artificial intelligence training data and companies developing artificial intelligence services. Data analysis was conducted through Fuzzy Set Qualitative Comparative Analysis (fsQCA) and Artificial Neural Network analysis (ANN), presenting academic and practical implications related to the quality of AI training data.

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

Optimum Elevation Angle Control of the Receiving Antenna for the Long Distance Air-Ground Common Data Link (장거리 공중-지상 영상정보용 데이터링크의 수신 안테나 최적 고각 제어 방법)

  • Ryu, Young-jae;Ahn, Jae-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1528-1538
    • /
    • 2016
  • Common data link systems are designed to transmit the imaginary and signal intelligence data at long distance air-ground line of sight(LOS) link. In this paper, we analyze the received power variation according to the communication distance of the common data link using curved earth 2-Ray model suitable for received signal power analysis of long distance air-ground wireless channel. We propose optimal elevation angle control method of the receiving antenna to reduce a power variation caused by ground-reflected wave. Proposed method can get additional link margin compared to the conventional method without any additional hardware performance enhancement.

The Study about Role and Importance of Site Activity Stage in Safety Activity for the International Conference among Several Countries (다자간 국제회의 안전활동에 있어서 현장활동단계의 역할 및 중요성에 관한 연구 : 부산 APEC 행사를 중심으로)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.105-138
    • /
    • 2009
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.

  • PDF

Utilization and Excavation Practices of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 활용 및 적용사례 발굴)

  • Choi, Gap Yong;Chang, Eun Mi;Kim, Seong Gon;Cho, Kwang-Hyun
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2014
  • In order to foster rapid disaster response and public life protection, National Emergency Management Agency has been trying to spread 'Emergency Rescue Standard System' on a national scale since 2006. The agency has also intensified management of firefighter's safety on disaster site by implementing danger predication training, specialized training and education and safety procedure check as a part of safety management officer duties. Nevertheless, there are limitations for effective fire fighting steps, such as damage spreading and life damage due to unawareness of illegal converted structure, structure transformation by high temperature and nearby hazardous material storage as well as extemporary situation handling endangered firefighter's life. In order to eliminate these limitations there is a need for an effort and technology application to minimize human errors such as inaccurate situational awareness, wrong decision built on experience and judgment of field commander and firefighters. The purpose of this study is to propose a new disaster response model which is applied with geospatial information. we executed spatial contextual awareness map analysis using fire-fighting vulnerable zone model to propose the new disaster response model and also examined a case study for Dalseo-gu in Daegu Metropolitan City. Finally, we also suggested operational concept of new proposed model on a national scale.

A Review of Intelligent Society Studies: A look on the future of AI and policy issues. (지능정보시대의 전망과 정책대응 방향 모색)

  • Sung, Wook-Joon;Hwang, Sungsoo
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.3-19
    • /
    • 2017
  • This article examines the issues around the coming age of artificial intelligence and the 4th industrial revolution. First, this articles addresses the changes we will encounter with the advance of innovative technologies. Changes in future jobs, education, travel and other lifestyle issues are discussed and responses of a few countries(governments) regarding preparations for such future changes are illustrated. To sum up, three dimensions - sustainable technology development, legal and policy-related establishments, and consensus building among the public - are identified as areas to focus on for the future. Particularly, it is advised that the Korean government apply and utilize new technologies to solve public issues and problems, particularly the newly-emerging "urban renewal" and "smart city" issues.

Literature Review of AI Hallucination Research Since the Advent of ChatGPT: Focusing on Papers from arXiv (챗GPT 등장 이후 인공지능 환각 연구의 문헌 검토: 아카이브(arXiv)의 논문을 중심으로)

  • Park, Dae-Min;Lee, Han-Jong
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.3-38
    • /
    • 2024
  • Hallucination is a significant barrier to the utilization of large-scale language models or multimodal models. In this study, we collected 654 computer science papers with "hallucination" in the abstract from arXiv from December 2022 to January 2024 following the advent of Chat GPT and conducted frequency analysis, knowledge network analysis, and literature review to explore the latest trends in hallucination research. The results showed that research in the fields of "Computation and Language," "Artificial Intelligence," "Computer Vision and Pattern Recognition," and "Machine Learning" were active. We then analyzed the research trends in the four major fields by focusing on the main authors and dividing them into data, hallucination detection, and hallucination mitigation. The main research trends included hallucination mitigation through supervised fine-tuning (SFT) and reinforcement learning with human feedback (RLHF), inference enhancement via "chain of thought" (CoT), and growing interest in hallucination mitigation within the domain of multimodal AI. This study provides insights into the latest developments in hallucination research through a technology-oriented literature review. This study is expected to help subsequent research in both engineering and humanities and social sciences fields by understanding the latest trends in hallucination research.

Bio-Inspired Routing Protocol for Mobile Ad Hoc Networks (이동 애드혹 네트워크를 위한 생체모방 라우팅 프로토콜)

  • Choi, Hyun-Ho;Roh, Bongsoo;Choi, HyungSeok;Lee, Jung-Ryun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2205-2217
    • /
    • 2015
  • Bio-inspired routing protocol uses a principle of swarm intelligence, which finds the optimal path to the destination in a distributed and autonomous way in dynamic environments, so that it can maximize routing performances, reduce control overhead, and recover a path failure quickly according to the change of network topology. In this paper, we propose a bio-inspired routing protocol for mobile ad hoc networks. The proposed scheme uses a function of overhearing via wireless media in order to obtain the routing information without additional overhead. Through overhearing, the pheromone is diffused around the shortest path between the source and destination. Based on this diffused pheromone, a probabilistic path exploration is executed and the useful alternative routes between the source and destination are collected. Therefore, the proposed routing protocol can ensure the up-to-date routing information while reducing the control overhead. The simulation results show that the proposed scheme outperforms the typical AODV and AntHocNet protocols in terms of routing performances and significantly decreases the routing overhead against the AntHocNet.