• Title/Summary/Keyword: Software systems

Search Result 5,585, Processing Time 0.033 seconds

A study on the effect of introducing EBS AR production system on content (EBS AR 실감영상 제작 시스템 도입이 콘텐츠에 끼친 영향에 대한 연구)

  • Kim, Ho-sik;Kwon, Soon-chul;Lee, Seung-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.711-719
    • /
    • 2021
  • EBS has been producing numerous educational contents with traditional virtual studio production systems since the early 2000s and applied AR video production system in October 2020, twenty-years after. Although the basic concept of synthesizing graphic elements and actual image in real time by tracking camera movement and lens information is similar to the previous one but the newly applied AR video production system contains some of advanced technologies that are improved over the previous ones. Marker tracking technology that enables camera movement free and position tracking has been applied that can track the location stably, and the operating software has been applied with Unreal Engine, one of the representative graphic engines used in computer game production, therefore the system's rendering burden has been reduced, enabling high-quality and real-time graphic effects. This system is installed on a crane camera that is mainly used in a crane shot at the live broadcasting studio and applied for live broadcasting programs for children and some of the videos such as program introductions and quiz events that used to be expressed in 2D graphics were converted to 3D AR videos which has been enhanced. This paper covers the effect of introduction and application of the AR video production system on EBS content production and the future development direction and possibility.

Malicious Traffic Classification Using Mitre ATT&CK and Machine Learning Based on UNSW-NB15 Dataset (마이터 어택과 머신러닝을 이용한 UNSW-NB15 데이터셋 기반 유해 트래픽 분류)

  • Yoon, Dong Hyun;Koo, Ja Hwan;Won, Dong Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.99-110
    • /
    • 2023
  • This study proposed a classification of malicious network traffic using the cyber threat framework(Mitre ATT&CK) and machine learning to solve the real-time traffic detection problems faced by current security monitoring systems. We applied a network traffic dataset called UNSW-NB15 to the Mitre ATT&CK framework to transform the label and generate the final dataset through rare class processing. After learning several boosting-based ensemble models using the generated final dataset, we demonstrated how these ensemble models classify network traffic using various performance metrics. Based on the F-1 score, we showed that XGBoost with no rare class processing is the best in the multi-class traffic environment. We recognized that machine learning ensemble models through Mitre ATT&CK label conversion and oversampling processing have differences over existing studies, but have limitations due to (1) the inability to match perfectly when converting between existing datasets and Mitre ATT&CK labels and (2) the presence of excessive sparse classes. Nevertheless, Catboost with B-SMOTE achieved the classification accuracy of 0.9526, which is expected to be able to automatically detect normal/abnormal network traffic.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Analysis of a Compound-Target Network of Oryeong-san (오령산 구성성분-타겟 네트워크 분석)

  • Kim, Sang-Kyun
    • Journal of the Korea Knowledge Information Technology Society
    • /
    • v.13 no.5
    • /
    • pp.607-614
    • /
    • 2018
  • Oryeong-san is a prescription widely used for diseases where water is stagnant because it has the effect of circulating the water in the body and releasing it into the urine. In order to investigate the mechanisms of oryeong-san, we in this paper construct and analysis the compound-target network of medicinal materials constituting oryeong-san based on a systems pharmacology approach. First, the targets related to the 475 chemical compounds of oryeong-san were searched in the STITCH database, and the search results for the interactions between compounds and targets were downloaded as XML files. The compound-target network of oryeong-san is visualized and explored using Gephi 0.8.2, which is an open-source software for graphs and networks. In the network, nodes are compounds and targets, and edges are interactions between the nodes. The edge is weighted according to the reliability of the interaction. In order to analysis the compound-target network, it is clustered using MCL algorithm, which is able to cluster the weighted network. A total of 130 clusters were created, and the number of nodes in the cluster with the largest number of nodes was 32. In the clustered network, it was revealed that the active compounds of medicinal materials were associated with the targets for regulating the blood pressure in the kidney. In the future, we will clarify the mechanisms of oryeong-san by linking the information on disease databases and the network of this research.

Design and Validate Usability of New Types of HMD Systems to Improve Work Efficiency in Collaborative Environments (협업 환경에서 작업 효율 향상을 위한 새로운 형태의 HMD 시스템 설계 및 사용성 검증)

  • Jeong-Hoon SHIN;Hee-Ju KWON
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.57-68
    • /
    • 2023
  • With the technological development in the era of the 4th Industrial Revolution, technologies using HMD are being applied in various fields. HMD is especially useful in virtual reality fields such as AR/VR, and is very effective in receiving vivid impressions from users located in remote locations. According to these characteristics, the frequency of using HMD is increasing in the field related to collaboration. However, when HMD is applied to collaboration, communication between experts located in remote locations and workers located in the field is not smooth, causing various problems in terms of usability. In this paper, remote experts and workers in the field use HMD to solve various problems arising from collaboration, design/propose new types of HMD structures and functions that enable more efficient collaboration, and verify their usability using SUS evaluation techniques. As a result of the SUS evaluation, the new type of HMD structure and function proposed in this paper was 86.75points, which is believed to have greatly resolved the restrictions on collaboration and inconvenience in use of the existing HMD structure. In the future, when the HMD structure and design proposed in this paper are actually applied, it is expected that the application technology using HMD will expand rapidly.

A Study on Social Network Characteristics, Social Support, Functional Recovery, and Life Satisfaction of People with Mental Illness (정신질환자의 사회관계망 특성, 사회적 지지 그리고 삶의 만족도에 관한 연구)

  • Kim, Jin-Mi;Shin, Hyo-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.85-96
    • /
    • 2023
  • In a reality where negative perceptions and social prejudices towards individuals with mental illnesses persist, the absence and lack of social support systems acquired through personal intimate social networks can be considered a significant hindrance to the quality of life for those with mental disorders. Therefore, this study examined the impact of the characteristics of social networks and social support on the life satisfaction of individuals with mental illnesses. A survey was conducted with 180 patients from seven mental health treatment facilities in the Daegu area. The data were analyzed using MANOVA, hierarchical multiple regression analysis, and Sobel test for mediation analysis with SPSS 25 software. The key findings of the study revealed that the intimacy aspect of social networks had a positive and significant effect on social support and life satisfaction. On the other hand, the size of the social network showed a negative influence on social support. Furthermore, social support partially mediated the relationship between the intimacy of social networks and life satisfaction, and it fully mediated the relationship between the size of social networks and life satisfaction. Based on these research outcomes, practical and policy-related recommendations are provided to enhance life satisfaction through increased social support for this population.

Performance Prediction for Plenoptic Microscopy Under Numerical Aperture Unmatching Conditions (수치 구경 불일치 플렌옵틱 현미경 성능 예측 방안 연구)

  • Ha Neul Yeon;Chan Lee;Seok Gi Han;Jun Ho Lee
    • Korean Journal of Optics and Photonics
    • /
    • v.35 no.1
    • /
    • pp.9-17
    • /
    • 2024
  • A plenoptic optical system for microscopy comprises an objective lens, tube lens, microlens array (MLA), and an image sensor. Numerical aperture (NA) matching between the tube lens and MLA is used for optimal performance. This paper extends performance predictions from NA matching to unmatching cases and introduces a computational technique for plenoptic configurations using optical analysis software. Validation by fabricating and experimenting with two sample systems at 10× and 20× magnifications resulted in predicted spatial resolutions of 12.5 ㎛ and 6.2 ㎛ and depth of field (DOF) values of 530 ㎛ and 88 ㎛, respectively. The simulation showed resolutions of 11.5 ㎛ and 5.8 ㎛, with DOF values of 510 ㎛ and 70 ㎛, while experiments confirmed predictions with resolutions of 11.1 ㎛ and 5.8 ㎛ and DOF values of 470 ㎛ and 70 ㎛. Both formula-based prediction and simulations yielded similar results to experiments that were suitable for system design. However, regarding DOF values, simulations were closer to experimental values in accuracy, recommending reliance on simulation-based predictions before fabrication.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

An Exploratory Study on the Strategic Responses to ESG Evaluation of SMEs (중소기업의 ESG평가에 대한 전략적 대응방안 탐색적 연구)

  • Park, Yoon Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.1
    • /
    • pp.47-65
    • /
    • 2023
  • As stakeholder demands and sustainable finance grow, ESG management and ESG evaluation are becoming important. SMEs should also prepare for the trends of ESG rating practices that affects supply chain management and financial transactions. However, SMEs have no choice but to focus on survival first, so there are restrictions on putting into ESG management. In addition, there is a lack of research on the legitimacy of ESG management by SMEs, and volatility in ESG evaluation systems and rating grades is also increasing. Accordingly, it is necessary to review ESG evaluation trends and practical guidelines along with the review of previous studies. As a result of the exploratory study, SMEs need to implement ESG management and make efforts to specialize in ESG related new businesses under conditions in which their survival base is guaranteed in terms of implementation strategies. In addition, it is necessary to focus on the strategic use of various evaluation results along with accumulating information favorable for ESG evaluation through organizational learning and software management. The implications of this study are that various studies such as the classification criteria for SMEs and the relationship between ESG evaluation grades and long-term survival rates are needed in ESG evaluation of SMEs. At the government policy level, it is time to consider the ESG evaluation system exclusively for SMEs so that ESG management can be implemented and ESG evaluation at different levels by industry and size.

  • PDF