• Title/Summary/Keyword: Network Data Analysis

Search Result 5,972, Processing Time 0.035 seconds

A Study on the Activation Plan for Professional Sport League through Exploration of Inducing Factors of Match Fixing (승부조작 유발요인 탐색을 통한 프로스포츠 활성화 방안)

  • Bang, Shin-Woong;Park, In-Sil;Kim, Wook-Ki
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.153-170
    • /
    • 2021
  • This study was attempted to derive strategic implications for activating professional sports by conducting in-depth interviews with professional sports officials such as players, teams, federations, agencies, etc., by searching for factors that cause match fixing and deriving preventive strategies based on them. Eight people with more than 3 years of experience working in professional sports were selected using the snowball sampling technique. Data were collected and analyzed by applying a semi-structured in-depth interview method for them. As a result of the analysis, five core categories (the learning effect from the cartel for entering university, the culture learned in a camp training, the manifestation of the latent learning effect, the negative effect of the human network, the personal disposition) were derived as factors causing match-fixing. As for the strategy to prevent match fixing, first, improving the college entrance examination system oriented on individual capability, second, improving the education system for student athlete, third, establishing a prevention system, fourth, continuing education, fifth, and activating the agent system as the core categories. Implications for the derived research results and future research directions were discussed.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

A Study on Artificial Intelligence Ethics Perceptions of University Students by Text Mining (텍스트 마이닝으로 살펴본 대학생들의 인공지능 윤리 인식 연구)

  • Yoo, Sujin;Jang, YunJae
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.947-960
    • /
    • 2021
  • In this study, we examine the AI ethics perception of university students to explore the direction of AI ethics education. For this, 83 students wrote their thoughts about 5 discussion topics on online bulletin board. We analyzed it using language networks, one of the text mining techniques. As a result, 62.5% of students spoke the future of the AI society positively. Second, if there is a self-driving car accident, 39.2% of students thought it is the vehicle owner's responsibility at the current level of autonomous driving. Third, invasion of privacy, abuse of technology, and unbalanced information acquisition were cited as dysfunctions of the development of AI. It was mentioned that ethical education for both AI users and developers is required as a way to minimize malfunctions, and institutional preparations should be carried out in parallel. Fourth, only 19.2% of students showed a positive opinion about a society where face recognition technology is universal. Finally, there was a common opinion that when collecting data including personal information, only the part with the consent should be used. Regarding the use of AI without moral standards, they emphasized the ethical literacy of both users and developers. This study is meaningful in that it provides information necessary to design the contents of artificial intelligence ethics education in liberal arts education.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

Quantitative preliminary hazard level simulation for tunnel design based on the KICT tunnel collapse hazard index (KTH-index) (터널 붕괴 위험도 지수(KTH-index)에 기반한 터널 설계안의 정량적 사전 위험도 시뮬레이션)

  • Shin, Hyu-Soung;Kwon, Young-Cheul;Kim, Dong-Gyou;Bae, Gyu-Jin;Lee, Hong-Gyu;Shin, Young-Wan
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.11 no.4
    • /
    • pp.373-385
    • /
    • 2009
  • A new indexing methodology so called KTH-index was developed to quantitatively evaluate a potential level for tunnel collapse hazard, which has been successfully applied to tunnel construction sites to date. In this study, an attempt is made to apply this methodology for validating an outcome of tunnel design by checking the variation of KTH-index along longitudinal tunnel section. In this KTH-index simulation, it is the most important to determine the input factors reasonably. The design factor and construction condition are set up based on the designed outcome. Uncertain ground conditions are arranged based on borehole test and electro-resistivity survey data. Two scenarios for ground conditions, best and worst scenarios, are set up. From this simulation, it is shown that this methodology could be successfully applied for providing quantitative validity of a tunnel design and also potential hazard factors which should be carefully monitored in construction stage. The hazard factors would affect sensitively the hazard level of the tunnel site under consideration.

The Analysis of Future Land Use Change Impact on Hydrology and Water Quality Using SWAT Model (SWAT 모형을 이용한 미래 토지이용변화가 수문 - 수질에 미치는 영향 분석)

  • Park, Jong-Yoon;Lee, Mi Seon;Lee, Yong Jun;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.2B
    • /
    • pp.187-197
    • /
    • 2008
  • This study is to assess the impact of future land use change on hydrology and water quality in Gyungan-cheon watershed ($255.44km^2$) using SWAT (Soil and Water Assessment Tool) model. Using the 5 past Landsat TM (1987, 1991, 1996, 2004) and $ETM^+$ (2001) satellite images, time series of land use map were prepared, and the future land uses (2030, 2060, 2090) were predicted using CA-Markov technique. The 4 years streamflow and water quality data (SS, T-N, T-P) and DEM (Digital Elevation Model), stream network, and soil information (1:25,000) were prepared. The model was calibrated for 2 years (1999 and 2000), and verified for 2 years (2001 and 2002) with averaged Nash and Sutcliffe model efficiency of 0.59 for streamflow and determination coefficient of 0.88, 0.72, 0.68 for Sediment, T-N (Total Nitrogen), T-P (Total Phosphorous) respectively. The 2030, 2060 and 2090 future prediction based on 2004 values showed that the total runoff increased 1.4%, 2.0% and 2.7% for 0.6, 0.8 and 1.1 increase of watershed averaged CN value. For the future Sediment, T-N and T-P based on 2004 values, 51.4%, 5.0% and 11.7% increase in 2030, 70.5%, 8.5% and 16.7% increase in 2060, and 74.9%, 10.9% and 19.9% increase in 2090.

A Study on the Implement of AI-based Integrated Smart Fire Safety (ISFS) System in Public Facility

  • Myung Sik Lee;Pill Sun Seo
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2023
  • Even at this point in the era of digital transformation, we are still facing many problems in the safety sector that cannot prevent the occurrence or spread of human casualties. When you are in an unexpected emergency, it is often difficult to respond only with human physical ability. Human casualties continue to occur at construction sites, manufacturing plants, and multi-use facilities used by many people in everyday life. If you encounter a situation where normal judgment is impossible in the event of an emergency at a life site where there are still many safety blind spots, it is difficult to cope with the existing manual guidance method. New variable guidance technology, which combines artificial intelligence and digital twin, can make it possible to prevent casualties by processing large amounts of data needed to derive appropriate countermeasures in real time beyond identifying what safety accidents occurred in unexpected crisis situations. When a simple control method that divides and monitors several CCTVs is digitally converted and combined with artificial intelligence and 3D digital twin control technology, intelligence augmentation (IA) effect can be achieved that strengthens the safety decision-making ability required in real time. With the enforcement of the Serious Disaster Enterprise Punishment Act, the importance of distributing a smart location guidance system that urgently solves the decision-making delay that occurs in safety accidents at various industrial sites and strengthens the real-time decision-making ability of field workers and managers is highlighted. The smart location guidance system that combines artificial intelligence and digital twin consists of AIoT HW equipment, wireless communication NW equipment, and intelligent SW platform. The intelligent SW platform consists of Builder that supports digital twin modeling, Watch that meets real-time control based on synchronization between real objects and digital twin models, and Simulator that supports the development and verification of various safety management scenarios using intelligent agents. The smart location guidance system provides on-site monitoring using IoT equipment, CCTV-linked intelligent image analysis, intelligent operating procedures that support workflow modeling to immediately reflect the needs of the site, situational location guidance, and digital twin virtual fencing access control technology. This paper examines the limitations of traditional fixed passive guidance methods, analyzes global technology development trends to overcome them, identifies the digital transformation properties required to switch to intelligent variable smart location guidance methods, explains the characteristics and components of AI-based public facility smart fire safety integrated system (ISFS).

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

A Qualitative Research on the Evaluation of Healthcare and Welfare Network for Vulnerable Populations : Focusing on the Dalgubeol Health Doctor Services (취약계층 대상 보건의료·복지 네트워크 사업 성과에 대한 질적연구 : 달구벌건강주치의사업을 중심으로)

  • Su-Jin Lee;Jong-Yeon Kim;Jae-Wook Kang;Hye-Jin Lee
    • Journal of agricultural medicine and community health
    • /
    • v.48 no.4
    • /
    • pp.262-274
    • /
    • 2023
  • Objectives: This study examined the evaluation and potential improvements of 'Integrated Healthcare and Social Welfare service model' based on the experiences of practitioners from institutions participating in the 'Dalgubeol Health Doctor Services' and the service recipients. Methods: Qualitative research was conducted from September to November 2022 in this study, focusing on 4 providers from the dedicated Dalgubeol Health Doctor Services Team, 5 contact partners from affiliated organizations, and 6 service beneficiaries. The data gathered underwent thematic analysis. Results: The evaluation indicated that Dalgubeol Health Doctor Services has proven to be effective in addressing the complex needs of vulnerable populations. By providing integrated services through quick and simple beneficiary selection and resource linkage, it has contributed to the resolution of complex demands, recovery of positive attitudes towards life, and improvement in quality of life for users who have fear the use of medical and welfare services. Dalgubeol Health Doctor Services has established an integrated health care system involving not only public but also private organizations, from the referral agency to the service provider. Centered around Daegu Medical Center and involving five tertiary hospitals, it has established a model that supports treatment appropriate to the severity of the patient, from mild to severe. Conclusions: These findings indicate an enhancement in health equity, achieved through the active identification and subsequent health and welfare issue resolution of individuals marginalized from medical benefits.