• Title/Summary/Keyword: Network Data Analysis

Search Result 5,879, Processing Time 0.032 seconds

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

A Study on Artificial Intelligence Ethics Perceptions of University Students by Text Mining (텍스트 마이닝으로 살펴본 대학생들의 인공지능 윤리 인식 연구)

  • Yoo, Sujin;Jang, YunJae
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.947-960
    • /
    • 2021
  • In this study, we examine the AI ethics perception of university students to explore the direction of AI ethics education. For this, 83 students wrote their thoughts about 5 discussion topics on online bulletin board. We analyzed it using language networks, one of the text mining techniques. As a result, 62.5% of students spoke the future of the AI society positively. Second, if there is a self-driving car accident, 39.2% of students thought it is the vehicle owner's responsibility at the current level of autonomous driving. Third, invasion of privacy, abuse of technology, and unbalanced information acquisition were cited as dysfunctions of the development of AI. It was mentioned that ethical education for both AI users and developers is required as a way to minimize malfunctions, and institutional preparations should be carried out in parallel. Fourth, only 19.2% of students showed a positive opinion about a society where face recognition technology is universal. Finally, there was a common opinion that when collecting data including personal information, only the part with the consent should be used. Regarding the use of AI without moral standards, they emphasized the ethical literacy of both users and developers. This study is meaningful in that it provides information necessary to design the contents of artificial intelligence ethics education in liberal arts education.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

Quantitative preliminary hazard level simulation for tunnel design based on the KICT tunnel collapse hazard index (KTH-index) (터널 붕괴 위험도 지수(KTH-index)에 기반한 터널 설계안의 정량적 사전 위험도 시뮬레이션)

  • Shin, Hyu-Soung;Kwon, Young-Cheul;Kim, Dong-Gyou;Bae, Gyu-Jin;Lee, Hong-Gyu;Shin, Young-Wan
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.11 no.4
    • /
    • pp.373-385
    • /
    • 2009
  • A new indexing methodology so called KTH-index was developed to quantitatively evaluate a potential level for tunnel collapse hazard, which has been successfully applied to tunnel construction sites to date. In this study, an attempt is made to apply this methodology for validating an outcome of tunnel design by checking the variation of KTH-index along longitudinal tunnel section. In this KTH-index simulation, it is the most important to determine the input factors reasonably. The design factor and construction condition are set up based on the designed outcome. Uncertain ground conditions are arranged based on borehole test and electro-resistivity survey data. Two scenarios for ground conditions, best and worst scenarios, are set up. From this simulation, it is shown that this methodology could be successfully applied for providing quantitative validity of a tunnel design and also potential hazard factors which should be carefully monitored in construction stage. The hazard factors would affect sensitively the hazard level of the tunnel site under consideration.

The Analysis of Future Land Use Change Impact on Hydrology and Water Quality Using SWAT Model (SWAT 모형을 이용한 미래 토지이용변화가 수문 - 수질에 미치는 영향 분석)

  • Park, Jong-Yoon;Lee, Mi Seon;Lee, Yong Jun;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.2B
    • /
    • pp.187-197
    • /
    • 2008
  • This study is to assess the impact of future land use change on hydrology and water quality in Gyungan-cheon watershed ($255.44km^2$) using SWAT (Soil and Water Assessment Tool) model. Using the 5 past Landsat TM (1987, 1991, 1996, 2004) and $ETM^+$ (2001) satellite images, time series of land use map were prepared, and the future land uses (2030, 2060, 2090) were predicted using CA-Markov technique. The 4 years streamflow and water quality data (SS, T-N, T-P) and DEM (Digital Elevation Model), stream network, and soil information (1:25,000) were prepared. The model was calibrated for 2 years (1999 and 2000), and verified for 2 years (2001 and 2002) with averaged Nash and Sutcliffe model efficiency of 0.59 for streamflow and determination coefficient of 0.88, 0.72, 0.68 for Sediment, T-N (Total Nitrogen), T-P (Total Phosphorous) respectively. The 2030, 2060 and 2090 future prediction based on 2004 values showed that the total runoff increased 1.4%, 2.0% and 2.7% for 0.6, 0.8 and 1.1 increase of watershed averaged CN value. For the future Sediment, T-N and T-P based on 2004 values, 51.4%, 5.0% and 11.7% increase in 2030, 70.5%, 8.5% and 16.7% increase in 2060, and 74.9%, 10.9% and 19.9% increase in 2090.

A Study on the Implement of AI-based Integrated Smart Fire Safety (ISFS) System in Public Facility

  • Myung Sik Lee;Pill Sun Seo
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2023
  • Even at this point in the era of digital transformation, we are still facing many problems in the safety sector that cannot prevent the occurrence or spread of human casualties. When you are in an unexpected emergency, it is often difficult to respond only with human physical ability. Human casualties continue to occur at construction sites, manufacturing plants, and multi-use facilities used by many people in everyday life. If you encounter a situation where normal judgment is impossible in the event of an emergency at a life site where there are still many safety blind spots, it is difficult to cope with the existing manual guidance method. New variable guidance technology, which combines artificial intelligence and digital twin, can make it possible to prevent casualties by processing large amounts of data needed to derive appropriate countermeasures in real time beyond identifying what safety accidents occurred in unexpected crisis situations. When a simple control method that divides and monitors several CCTVs is digitally converted and combined with artificial intelligence and 3D digital twin control technology, intelligence augmentation (IA) effect can be achieved that strengthens the safety decision-making ability required in real time. With the enforcement of the Serious Disaster Enterprise Punishment Act, the importance of distributing a smart location guidance system that urgently solves the decision-making delay that occurs in safety accidents at various industrial sites and strengthens the real-time decision-making ability of field workers and managers is highlighted. The smart location guidance system that combines artificial intelligence and digital twin consists of AIoT HW equipment, wireless communication NW equipment, and intelligent SW platform. The intelligent SW platform consists of Builder that supports digital twin modeling, Watch that meets real-time control based on synchronization between real objects and digital twin models, and Simulator that supports the development and verification of various safety management scenarios using intelligent agents. The smart location guidance system provides on-site monitoring using IoT equipment, CCTV-linked intelligent image analysis, intelligent operating procedures that support workflow modeling to immediately reflect the needs of the site, situational location guidance, and digital twin virtual fencing access control technology. This paper examines the limitations of traditional fixed passive guidance methods, analyzes global technology development trends to overcome them, identifies the digital transformation properties required to switch to intelligent variable smart location guidance methods, explains the characteristics and components of AI-based public facility smart fire safety integrated system (ISFS).

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

A Qualitative Research on the Evaluation of Healthcare and Welfare Network for Vulnerable Populations : Focusing on the Dalgubeol Health Doctor Services (취약계층 대상 보건의료·복지 네트워크 사업 성과에 대한 질적연구 : 달구벌건강주치의사업을 중심으로)

  • Su-Jin Lee;Jong-Yeon Kim;Jae-Wook Kang;Hye-Jin Lee
    • Journal of agricultural medicine and community health
    • /
    • v.48 no.4
    • /
    • pp.262-274
    • /
    • 2023
  • Objectives: This study examined the evaluation and potential improvements of 'Integrated Healthcare and Social Welfare service model' based on the experiences of practitioners from institutions participating in the 'Dalgubeol Health Doctor Services' and the service recipients. Methods: Qualitative research was conducted from September to November 2022 in this study, focusing on 4 providers from the dedicated Dalgubeol Health Doctor Services Team, 5 contact partners from affiliated organizations, and 6 service beneficiaries. The data gathered underwent thematic analysis. Results: The evaluation indicated that Dalgubeol Health Doctor Services has proven to be effective in addressing the complex needs of vulnerable populations. By providing integrated services through quick and simple beneficiary selection and resource linkage, it has contributed to the resolution of complex demands, recovery of positive attitudes towards life, and improvement in quality of life for users who have fear the use of medical and welfare services. Dalgubeol Health Doctor Services has established an integrated health care system involving not only public but also private organizations, from the referral agency to the service provider. Centered around Daegu Medical Center and involving five tertiary hospitals, it has established a model that supports treatment appropriate to the severity of the patient, from mild to severe. Conclusions: These findings indicate an enhancement in health equity, achieved through the active identification and subsequent health and welfare issue resolution of individuals marginalized from medical benefits.

Comparison of Integrated Health and Welfare Service Provision Projects Centered on Medical Institutions (의료기관 중심 보건의료·복지 통합 서비스 제공 사업 비교)

  • Su-Jin Lee;Jong-Yeon Kim
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.132-145
    • /
    • 2024
  • Objectives: This study compares cases of Dalgubeol Health Care Project, 301 Network Project, and 3 for 1 Project based on program logic models to derive measures for promoting integrated healthcare and welfare services centered around medical institutions. Methods: From January to December 2021, information on the implementation systems and performance of each institution was collected. Data sources included prior academic research, project reports, operational guidelines, official press releases, media articles, and written surveys from project managers. A program logic model analysis framework was applied, structuring the information based on four elements: situation, input, activity, and output. Results: All three projects aimed to address the fragmentation of health and welfare services and medical blind spots. Despite similar multidisciplinary team compositions, differences existed in specific fields, recruitment scale, and employment types. Variations in funding sources led to differences in community collaboration, support methods, and future directions. There were discrepancies in the number of beneficiaries and medical treatments, with different results observed when comparing the actual number of people to input manpower and project cost per beneficiary. Conclusions: To design an integrated health and welfare service provision system centered on medical institutions, securing a stable funding mechanism and establishing an appropriate target population and service delivery system are crucial. Additionally, installing a dedicated department within the medical institution to link activities across various sectors, rather than outsourcing, is necessary. Ensuring appropriate recruitment and stable employment systems is needed. A comprehensive provision system offering services from mild to severe cases through public-private cooperation is suggested.