• Title/Summary/Keyword: Security Issues

Search Result 1,613, Processing Time 0.025 seconds

Enhanced Machine Learning Preprocessing Techniques for Optimization of Semiconductor Process Data in Smart Factories (스마트 팩토리 반도체 공정 데이터 최적화를 위한 향상된 머신러닝 전처리 방법 연구)

  • Seung-Gyu Choi;Seung-Jae Lee;Choon-Sung Nam
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.57-64
    • /
    • 2024
  • The introduction of Smart Factories has transformed manufacturing towards more objective and efficient line management. However, most companies are not effectively utilizing the vast amount of sensor data collected every second. This study aims to use this data to predict product quality and manage production processes efficiently. Due to security issues, specific sensor data could not be verified, so semiconductor process-related training data from the "SAMSUNG SDS Brightics AI" site was used. Data preprocessing, including removing missing values, outliers, scaling, and feature elimination, was crucial for optimal sensor data. Oversampling was used to balance the imbalanced training dataset. The SVM (rbf) model achieved high performance (Accuracy: 97.07%, GM: 96.61%), surpassing the MLP model implemented by "SAMSUNG SDS Brightics AI". This research can be applied to various topics, such as predicting component lifecycles and process conditions.

A study on Satisfaction with Treatment in Medically vulnerable areas based on DRM (DRM기반 의료취약지 진료만족도 조사 연구)

  • Kyeung-Hwa Lee
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.2
    • /
    • pp.213-220
    • /
    • 2021
  • A policy is needed to provide appropriate medical services to rural residents living in medically vulnerable areas and to resolve imbalances in health and medical resources through this. In general, a survey method is used to secure medical services to the residents, and a security policy is needed to distribute and collect the questionnaire type and personal information between the investigator and the participant as digital contents. The proposed thesis introduces DRM (Digital Rights Management) technology as a way to safely manage the questionnaire type of the investigator and the personal information of the participants, and improves the problem that the existing License Server issues, renews, and cancels licenses to all domains. In order to do this, it provides convenience to the DRM-based survey policy that only DMs bundled with the family domain performs license management after the certificate is issued.

Development of IoT-based Hazardous Gas Environment Control System (IoT 기반 유해 가스 환경 제어 시스템 개발)

  • Chul-Hoon Kim;Dae-Hyun Ryu;Tae-Wan Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.1013-1018
    • /
    • 2024
  • This study developed and evaluated a real-time monitoring system utilizing IoT technology to prevent disasters caused by hazardous gases in industrial settings. The developed system detects harmful gases in real-time and issues prompt alerts, achieving over 98% data accuracy and response times under 3 seconds. The system consists of sensor nodes, a central processing unit, and a user interface, monitoring the work environment and worker status in real-time through a cloud-based remote surveillance and control program. Performance evaluation results show that this system presents a new approach for effectively managing safety in industrial sites. Future developments are expected to include improvements in multi-gas detection capabilities, development of AI-based prediction models, and enhanced security measures, evolving into a more advanced monitoring system.

Navigating Ethical AI: A Comprehensive Analysis of Literature and Future Directions in Information Systems (AI와 윤리: 문헌의 종합적 분석과 정보시스템 분야의 향후 연구 방향)

  • Jinyoung Min
    • Knowledge Management Research
    • /
    • v.25 no.3
    • /
    • pp.1-22
    • /
    • 2024
  • As the use of AI becomes a reality in many aspects of daily life, the opportunities and benefits it brings are being highlighted, while concerns about the ethical issues it may cause are also increasing. The field of information systems, which studies the impact of technology on business and society, must contribute to ensuring that AI has a positive influence on human society. To achieve this, it is necessary to explore the direction of research in the information systems field by examining various studies related to AI and ethics. For this purpose, this study collected literature from 2020 to the present and analyzed their research topics through researcher coding and topic modeling methods. The analysis results categorized research topics into AI ethics principles, ethical AI design and development, ethical AI deployment and application, and ethical AI use. After reviewing the literature in each category to grasp the current state of research, this study suggested future research directions for AI ethics in the field of information systems.

Study on Implementation Measures of Provincial Self-governing Police System : Focusing on the Implication from Enlargement of Work Scope of Self-governing Police of Jeju Province (광역자치경찰제의 정착방안에 관한 연구 - 제주자치경찰의 사무확대에 대한 시사점을 중심으로 -)

  • Kim, Seong-Hee
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.37-69
    • /
    • 2019
  • According to viewpoints of researchers and stakeholders, various opinions can be suggested on self-governing police system. Therefore, success of Korean self-governing police system will be defending on how to balance among conflicting values such as Empowerment, Political neutrality, Financial issues, Comprehensive competence in maintaining public safety. Before the launching of self-governing police system nation-wide, the experience of Jeju provincial police will be valuable model case. In specific, enlargement of work scope of self-governing police in Jeju province which has been introduced since last year will be a useful reference. There is more pessimism about self-governing police of Jeju province so far. However, this perspective is mostly based on the issue regarding hardwares such as manpower, equipment, law and organization. Issues regarding softwares such as organizational culture, operation system and work process need more attention to evaluate self-governing police system properly. To mark the first year after enlargement of work scope of Jeju police, this study demonstrate the overall result and implications of self-governing police of Jeju province based on documents, statistics, reports and media reports. In result, several preconditions are needed to implement the self-governing police system nation-wide successfully. 1. Strengthen the link between local government and local police 2. Establish the foundation for collaboration of state and local police 3. Enhance the aspect of citizen autonomy in local level 4. Reinforcing the capability of handling situation of state and local police 5. Invigorating the inter-organizational working group to operate self-governing police system effectively. The self-governing police system is unclosed topic to discuss. After this study, in-depth studies should be followed with more resources. Particularly, additional perspective including redundancy and equity need to be considered regarding self-governing police. By getting with the changes of macroscopic trends - lowbirth and aging, the fourth industrial revolution and possible reunification of north and south Koreas - these studies should suggest the long-term blueprint of self-governing police system of Korea.

The Problem of Space Debris and the Environmental Protection in Outer Space Law (우주폐기물과 지구 및 우주환경의 보호)

  • Lee, Young Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.205-237
    • /
    • 2014
  • Last 50 years there were a lot of space subjects launched by space activities of many states and these activities also had created tremendous, significant space debris contaminating the environment of outer space. The large number of space debris which are surrounding the earth have the serious possibilities of destroying a satellite or causing huge threat to the space vehicles. For example, Chinese anti-satellite missile test was conducted by China on January 11, 2007. As a consequence a Chinese weather satellite was destroyed by a kinetic kill vehicle traveling with a speed of 8 km/s in the opposite direction. Anti-satellite missile tests like this,contribute to the formation of enormous orbital space debris which can remain in orbit for many years and could interfere with future space activity (Kessler Syndrome). The test is the largest recorded creation of space debris in history with at least 2,317 pieces of trackable size (golf ball size and larger) and an estimated 150,000 debris particles and more. Several nations responded negatively to the test and highlighted the serious consequences of engaging in the militarization of space. The timing and occasion aroused the suspicion of its demonstration of anti-satellite (ASAT) capabilities following the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris. Therefore this breakup seemed to serve as a momentum of the UN Space Debris Mitigation Guidelines and the background of the EU initiatives for the International Code of Conduct for Outer Space Activities. The UN Space Debris Mitigation Guidelines thus adopted contain many technical elements that all the States involved in the outer space activities are expected to observe to produce least space debris from the moment of design of their launchers and satellites until the end of satellite life. Although the norms are on the voluntary basis which is normal in the current international space law environment where any attempt to formulate binding international rules has to face opposition and sometimes unnecessary screening from many corners of numerous countries. Nevertheless, because of common concerns of space-faring countries, the Guidelines could be adopted smoothly and are believed faithfully followed by most countries. It is a rare success story of international cooperation in the area of outer space. The EU has proposed an International Code of Conduct for Outer Space Activities as a transparency and confidence-building measure. It is designed to enhance the safety, security and sustainability of activities in outer space. The purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security. Of the space issues, the space debris reduction and the space traffic management require some urgent attention. But the current legal instruments of the outer space do not have any binding rules to be applied thereto despite the incresing activities on the outer space. We need to start somewhere sometime soon before it's too late with the chaotic situation. In this article, with a view point of this problem, focused on the the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris and tried to analyse the issues of space debris reduction.

A study on factors affecting high school students of school violence - Focusing on personality factors - (고등학생의 학교폭력에 영향을 미치는 요인에 관한 연구 : 인성요인을 중심으로)

  • Lee, Jung-Duk;Chang, Jeong-Hyeon
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.393-422
    • /
    • 2015
  • The school is committed to the role of public education for the effective development of student academic achievement and intellectual ability. It is also a space to expand the range of care and understanding for others with as a member of the academic community as well. However, the reality of our country schooling has been pointed out that if a lot about the lack of character education related to the attitude of life care for others and feel a sense of responsibility. An individual is not necessarily emotional intelligence There are side out, as well as grow into adults, schools are obliged to teach a variety of methods associated with it. Nevertheless, education is not of the country beyond the formal excessive administrative work or other activities due to the process of character education to neglect, including the work of teachers. Therefore, students brought the expansion of the act that should not, and eventually lead to serious social issues that directly harm others, such as school violence. Therefore, students brought the expansion of the act that should not, and eventually lead to serious social issues that directly harm others, such as school violence. This study is based on an act of juvenile delinquency and criminology education was to refine the concept of toughness and validate the relationship between school violence through empirical research. Accordingly, from July 1, 2013 September 31, 2013 to 277 high schools across the country are attending the third year of the schools available for non-response and analysis of the students who participated in the admission and simulated typical presentation of K University in Gyeonggi-do not judge students in the final analysis, except for the data and data from a total of 1045 patients were utilized. As a result, many schools have experienced violence, male student work can be applied to a lot of rock school violence was experienced. Also, a lot of experience can be applied to a healthy student rock school violence, anger-control and empathy, this is considered a low student showed consciousness experienced school violence exerted.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Study on the Legal Issues of New Draft of Civil Aviation Law in China (중국 민용항공법 개정 최근 동향과 주요 법적쟁점)

  • Lee, Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.2
    • /
    • pp.177-214
    • /
    • 2016
  • During more than 20 years of practice, Civil Aviation Law has experienced three times of amendments since it was enacted in 1995. But these revisions are limited to the technical level. The problems and limitations have become increasingly prominent in its implementation. Firstly, the civil aviation law is the result of interests game among several departments and some legal issues was left behind and the regulation was very vague as a result. Secondly, the process of aviation legislation is the process that the country has undergone profound changes and social transformation. The 20 years is long enough for the society to undergo tremendous changes and 1995 version of civil aviation law does not keep pace of development of economy. There was a serious lag between reality and the law. In order to actively promote the development of the aviation industry and overcome implementation issues of the Civil Aviation Law, Civil Aviation Administration of China (CAAC) initiated modification procedure the law and published new draft of Civil Aviation Law in August 2016. The spirit of this modification is to learn and absorb new achievements of domestic and foreign legislation and the International Convention on civil aviation. Furthermore, the purpose of the revision is to provide favorable policy for the development of civil aviation industry and improve aviation safety and supervision, strengthen and protection of consumer rights and interests, to enhance the safety of civil aviation activities, and promote the development of general aviation. This revision concerned to the 78 articles which are revised or deleted and 24 articles added. The highlights of the draft include but not limited to the enhancement of security management, clarification of the main responsibility for production safety. And also it added the provisions related to the construction of effective tracking capability of public air transport enterprises and license system on the transport of dangerous goods. Compared with the existing civil aviation law, the draft has made a great improvements. But there are several deficiencies and limitations in the drafts. These problems need to be supplemented and perfected through further amendments in near future.

Multi-Category Sentiment Analysis for Social Opinion Related to Artificial Intelligence on Social Media (소셜 미디어 상에서의 인공지능 관련 사회적 여론에 대한 다 범주 감성 분석)

  • Lee, Sang Won;Choi, Chang Wook;Kim, Dong Sung;Yeo, Woon Young;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.51-66
    • /
    • 2018
  • As AI (Artificial Intelligence) technologies have been swiftly evolved, a lot of products and services are under development in various fields for better users' experience. On this technology advance, negative effects of AI technologies also have been discussed actively while there exists positive expectation on them at the same time. For instance, many social issues such as trolley dilemma and system security issues are being debated, whereas autonomous vehicles based on artificial intelligence have had attention in terms of stability increase. Therefore, it needs to check and analyse major social issues on artificial intelligence for their development and societal acceptance. In this paper, multi-categorical sentiment analysis is conducted over online public opinion on artificial intelligence after identifying the trending topics related to artificial intelligence for two years from January 2016 to December 2017, which include the event, match between Lee Sedol and AlphaGo. Using the largest web portal in South Korea, online news, news headlines and news comments were crawled. Considering the importance of trending topics, online public opinion was analysed into seven multiple sentimental categories comprised of anger, dislike, fear, happiness, neutrality, sadness, and surprise by topics, not only two simple positive or negative sentiment. As a result, it was found that the top sentiment is "happiness" in most events and yet sentiments on each keyword are different. In addition, when the research period was divided into four periods, the first half of 2016, the second half of the year, the first half of 2017, and the second half of the year, it is confirmed that the sentiment of 'anger' decreases as goes by time. Based on the results of this analysis, it is possible to grasp various topics and trends currently discussed on artificial intelligence, and it can be used to prepare countermeasures. We hope that we can improve to measure public opinion more precisely in the future by integrating empathy level of news comments.