• Title/Summary/Keyword: System security

Search Result 9,713, Processing Time 0.038 seconds

An Analysis of Military Strategies in the Israel-Hamas War (2023): Asymmetric Tactics and Implications for International Politics (이스라엘-하마스 전쟁(2023)의 군사전략 분석: 비대칭 전술과 국제정치적 함의)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.389-395
    • /
    • 2024
  • This study aims to deeply analyze the military strategies and tactics used in the battles between Israel and Hamas, to understand the military approaches, technical capabilities, and their impact on the outcomes of the conflict. To achieve this, methodologies such as literature review, data analysis, and case studies were utilized. The research findings confirm that Hamas employed asymmetric tactics, such as rocket attacks and surprise attacks through underground tunnels, to counter Israel's military superiority. On the other hand, Israel responded to Hamas's attacks with the Iron Dome interception system and intelligence-gathering capabilities, but faced difficulties due to Hamas's underground tunnel network. After six months of fighting, the casualties in the Gaza Strip exceeded 30,000, and more than 1.7 million people became refugees. Israel also suffered over 1,200 deaths. Militarily, neither side achieved a decisive victory, resulting in a war of attrition. This study suggests that the Israel-Hamas war exemplifies the complexity of modern asymmetric warfare. Furthermore, it recommends that political compromise between the two sides and active mediation efforts by the international community are necessary for the peaceful resolution of the Israel-Palestine conflict.

Volume Rendering System of e-Science Electron Microscopy using Grid (Gird를 이용한 e-사이언스 전자현미경 볼륨 랜더링 시스템)

  • Jeong, Won-Gu;Jeong, Jong-Man;Lee, Ho;Choe, Sang-Su;Ahn, Young-heon;Hur, Man-Hoi;Kim, Jay;Kim, Eunsung;Jung, Im Y.;Yeom, Heon Y.;Cho, Kum Won;Kweon, Hee-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.560-564
    • /
    • 2007
  • Korea Basic Science Institute(KBSI) has three general electron microscopes including High Voltage Electron Microscope(HVEM) which is the only one in Korea. Observed images through an electron microscope are what they are tilted by each step and saved, offering the more better circumstances for observers, a reconstruction to 3D could be a essential process. In this process, a warping method decreases distortions maximumly of avoided parts of a camera's focus. All these image treatment processes and 3D reconstruction processes are based on an accompaniment of a highly efficient computer, a number of Grid Node Personal computers share this process in a short time and dispose of it. Grid Node Personal computers' purpose is to make an owner can share different each other and various computing resources efficiently and also Grid Node Personal computers is applying to solve problems like a role scheduling needed for a constructing system, a resource management, a security, a capacity measurement, a condition monitoring and so on. Grid Node Personal computers accomplish roles of a highly efficient computer that general individuals felt hard to use, moreover, a image treatment using the warping method becomes a foundation for reconstructing to more closer shape with an real object of observation. Construction of the electron microscope volume 랜더링 system based on Grid Node Personal computer through the warping process can offer more convenient and speedy experiment circumstances to observers, and makes them meet with experiment outcome that is similar to real shapes and is easy to understand.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

The identification of optimal data range for the discrimination between won and lost

  • Han, Doryung;Choi, Hyongjun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.103-111
    • /
    • 2020
  • Performance indicators have often investigated and developed in order to identify foundational elements and factors for an enhancement of performance in sports. In order to identify the valid performance indicators it is important that the indicators used within a performance analysis system discriminate between the winning and losing performances within a match (Hughes and Bartlett, 2002). However, the performance indicators proposed in research studies on basketball performance have not been used for real-time analysis and feedback within a coaching context. Such real-time support for the coach and players has been described within research on other sports (Choi et al., 2004; O'Donoghue, 2001; Palmer et al., 1997). Within the process of real-time feedback, the identification of relevant performance indicators that distinguish winning and losing performances should be the first stage of the development of a real-time analysis system. Therefore, this study investigated the differences between winning and losing teams in terms of a set of performance indicators gathered during the analysis of 10 English National Basketball League matches. Winning and losing teams were compared using whole match data (N=10) as well as individual quarters (N=40). A series of Wilcoxon Signed Ranks tests was used to identify the relevant performance indicators that discriminate between winning and losing performers within whole matches and individual quarters. The tests found that 3 point shots made (p<0.05) and Assists (p<0.05) were significantly different between winning and losing teams within matches. However, 2 point shots made (p<0.05), 2 point shots attempted (P<0.05), percentages of 2 point shots scored (p<0.05), 3 point shots made (p<0.05), Defensive Rebounds (p<0.05) and Assists (p<0.05) were significantly different between winning and losing performance within quarters. The analysis task should be based on relevant performance indicators which explain the current performances to performance analysts and coaches. Within a real-time analysis and feedback scenario, this will have the additional benefit of supporting a decision based on immediate performance within the most recent quarter. Consequently, the real-time analysis system would use performance indicators which have the property of construct validity to support the decisions of the coach.

A Study on Cognition about 119 Rescue·First Aid Team - Gwangju Area College Student as the Central Figure - (119구조·구급대에 대한 인식도 조사 연구 - 광주지역 보건계열과 비보건계열 대학생을 중심으로 -)

  • Kim, Kab-Sun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.141-152
    • /
    • 2002
  • The purpose of this study is to provide the basic materials for searching the way of improvement to heighten the emergency medical welfare level by one step further. To achieve this purpose, the subjects of this study were selected 452 college students in Gwangju, using a random sampling method. The statistical analysis methods utilized for analyzing the collected data are frequency analysis, $x^2$ test. The conclusions obtained from these analyses are as following ; 1. In question about necessary optimum number of persons for rescue first aid activity, health and non-health major college students responded by 39.2%, 45.3% respectively that rescue team 15 people, first aid team 3 people is most suitable. But there was no significant difference in major department(p<0.05). 2. In question about security of the public health doctor and the emergency medical technician, all health and non-health major college students are recognizing necessity urgently, but there was no significant difference in major department(p<0.05). 3. In question about 119 rescue first aid team member applying for an examination qualification grant to the department of EMT's graduate, all health and non-health major college students were highest by 52.9%, 52.4% respectively in "necessity" item. But there was no significant difference in major department(p<0.05). 4. Because rescue first aid equipment level appears higher than 41.7% in non-health major college student's case by 54.2% in health major college student's case, health major college students are recognizing that equipment level should be supplemented more but there was no significant difference in major department(p<0.05). 5. In question about equipment supplement, all health and non-health major college students appeared highest by 64.8%, 69.3% in accident type different special equipment. But there was no significant difference in major department(p<0.05). 6. In question about rescue ambulance car size, we could know being thinking that health and non-health major college student each 61.2%, 56.5% is small and narrow that large size of the rescue ambulance amount need. But there was no significant difference in major department(p<0.05). 7. In question about patient's state is worsened, because rescue first aid equipment is inferior, health major college student responded sometimes 55.1%, many 29.5%. very many by 11.5%, while non-health major college student responded 65.8%, 23.1%, 4.0% respectively. There was significant difference in major department(p<0.05). 8. In question about emergency patient must utilize for 119 rescue ambulance car, all health and non-health major college students appeared highest by 38.8%, 41.3% in "not so" item. In question about rescue first aid team's first-aid treatment ability improves more, all health and non-health major college students appeared highest by 58.1% and 58.7% respectively in "improve" item. In question about "119 rescue ambulance car must go more rapidly than now", all health and non-health major college students are recognizing that should be quicker by 58.1%, 60.9% respectively. When called to 119 all health and non-health major college students responded highest by 55.5%, 53.3% respectively that we must receive first-aid treatment direction from a doctor. In question about "119 rescue ambulance car must be made the pay system", all health and non-health major college students responded 74%, 80% respectively in "not so" item. There was significant difference in major department(p<0.05). In conclusions, In oder to provide superior rescue first aid service to people, a public health doctor should be placed in the situation room inside the fire station so that the doctor could instruct the proper emergency treatment suitable for each situation to the rescue first aid team. Also, national education about a first-aid treatment that do to all people is necessarily necessary in emergency delivery system and this should be spread extensively through school education and broadcasting medium and education should be gone side by side, and see that will can save emergency patients' life which is more when these education consists continuously fixed period for public institution of policeman, fire officer etc. specially. And for reinforcement of patient transfer system, public organization must procure special ambulance car so that emergency patient receive first aid treatment while transfer.

  • PDF

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

A Structural Equation Modeling of Internalizing Problem Behaviors of Korean Chinese'left-behind'Children in China (중국 조선족 유수아동의 내재화 문제행동에 관한 구조모형)

  • Hyun, Mina;Park, Jisun;Shin, Dong-Myeon
    • 한국사회정책
    • /
    • v.24 no.1
    • /
    • pp.153-185
    • /
    • 2017
  • The purpose of this study is to investigate the actual conditions and causes of the problem behaviors of Korean Chinese'left-behind'children in China in order to propose a support system to prevent problem behaviors of them. For this purpose, a questionnaire survey was conducted on 399 children who attend at three Korean Chines schools in Yonbian in China. The questionnaire consisted of general characteristics, internalizing problem behavior, social support, self-esteem, and self-resilience. This paper analysed the survey data by employing one-way ANOVA and a structural equation modeling. It verified if there is significant difference in internalizing problem behaviour, self-esteem, self-resilience, and social support between left-behind children's group and non left-behind children's group. It also identified a structural causal relationship and direct or indirect effects among problematic behaviour, self-esteem, self-resilience, and social support. The results of the analysis are as follows. First, there was a statistically significant difference in the social withdrawal and depression of internalizing problem behaviors between left-behind children's group and non left-behind children's group. Second, the left-behind children's group showed no significant difference in self-resilience and social support compared to non left-behind children's group, but showed a significant difference in self-esteem. In the positive self- esteem factor, non left-behind children's group showed much higher score whereas left-behind children's group was higher in the negative self-esteem factor. Third, social support for left-behind children's group has a statistically significant direct negative effect on internalizing problem behaviors, and indirectly negative effects on problem behavior through self-resilience. These results suggest the necessity of establishing a social support system for mitigating and preventing problem behaviors and the necessity of preparing measures to improve self-resilience. Based on the results of the study, we discussed how to establish a social support system in China to mitigate internalizing problem behaviors of Korean Chinese left-behind children.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.