• Title/Summary/Keyword: information collection system

Search Result 1,610, Processing Time 0.033 seconds

A Methodology of AI Learning Model Construction for Intelligent Coastal Surveillance (해안 경계 지능화를 위한 AI학습 모델 구축 방안)

  • Han, Changhee;Kim, Jong-Hwan;Cha, Jinho;Lee, Jongkwan;Jung, Yunyoung;Park, Jinseon;Kim, Youngtaek;Kim, Youngchan;Ha, Jeeseung;Lee, Kanguk;Kim, Yoonsung;Bang, Sungwan
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.77-86
    • /
    • 2022
  • The Republic of Korea is a country in which coastal surveillance is an imperative national task as it is surrounded by seas on three sides under the confrontation between South and North Korea. However, due to Defense Reform 2.0, the number of R/D (Radar) operating personnel has decreased, and the period of service has also been shortened. Moreover, there is always a possibility that a human error will occur. This paper presents specific guidelines for developing an AI learning model for the intelligent coastal surveillance system. We present a three-step strategy to realize the guidelines. The first stage is a typical stage of building an AI learning model, including data collection, storage, filtering, purification, and data transformation. In the second stage, R/D signal analysis is first performed. Subsequently, AI learning model development for classifying real and false images, coastal area analysis, and vulnerable area/time analysis are performed. In the final stage, validation, visualization, and demonstration of the AI learning model are performed. Through this research, the first achievement of making the existing weapon system intelligent by applying the application of AI technology was achieved.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

A Study on the Cooperative Marketing of Fishery Products in Korea (수협 마아케팅에 관한 연구)

  • 안세원
    • The Journal of Fisheries Business Administration
    • /
    • v.17 no.1
    • /
    • pp.77-106
    • /
    • 1986
  • In the field of fisheries, there is at the apex Central Federation of Fishery Cooperatives, established under the Fishery Cooperatives Law(1962), It is a multipurpose organization with a membership of 105 cooperatives, 87 regional cooperatives, 15 business-type cooperatives and 3 manufactures' cooperatives. Accordingly, this thesis examines the marketing of fishery cooperatives in Korea, and in particular considers the marketing channel strategy of fisheries products. No company can perform by itself all the activities involved in the production and distribution of its products and services to its final markets. It must work with other firms to get the job done. Thus marketing channel firms of the fisheries products include primarily the fishery cooperatives, the licensed In the field of fisheries, there is at the apex Central Federation of Fishery Cooperatives, established under the Fishery Cooperatives Law (1962). It is a multipurpose organization with a membership of 105 cooperatives, 87 regional cooperatives, 15 business-type cooperatives and 3 manufactures' cooperatives. Accordingly, this thesis examines the marketing of fishery cooperatives in Korea, and in particular considers the marketing channel strategy of fisheries products. No company can perform by itself all the activities involved in the production and distribution of its products and services to its final markets. It must work with other firms to get the job done. Thus marketing channel firms of the fisheries products include primarily the fishery cooperatives, the licensed dealers and the merchant middlemen. The goal of marketing is in matching of segments of supply and demand. Every producer seeks to the link the marketing channel firms that will help it accomplish its objective best. This thesis tries to attempt to improve the present Korean Fishery Cooperatives marketing activities. The purpose of the operation of fishery cooperatives is to guarantee the profits of fisherman as well as the interests of general consumers by eliminating the inordinate profits of middlemen and by narrowing other market margins. Fishery cooperatives marketing activity functions forming a self-helf organization for economic protection of producers themselves, and acting as a market reformational institution through its transaction by group. The following are the characteristics of fishery cooperatives marketing. \circled1 Fishery cooperatives is organized with an economic factor and a personnel factor. \circled2 Fishery cooperatives is non-profit organization. \circled3 The members of fishery cooperatives is independent constitution of economy, but they are closely connected with the cooperative. \circled4 Fishery cooperatives is a mutual aid organization. The objective of an efficient marketing strategy may be well described by the common saying provides the right product at the right time, the right place, and the right price. But it is quite true that the Korean Fishermen's Cooperative can be said to owe its development to the successful implementation of the marketing system. The use of the marketing system has resulted in the following marketing strategy. 1. The direct marketing system. \circled1 The cooperation between the fishery cooperatives and the other cooperative through the collection and delivery center. \circled2 The selling between the fishery cooperatives and the large scale retailers through the process industry. 2. The vertical marketing system. \circled1The fishermen's cooperative to be nominated by wholesaler in the terminal market. \circled2 Contracted vertical marketing system. \circled3 Abolition of selling by double auction in the landing and the terminal market. 3. The physical distribution system. \circled1 The need for adoption of cold chain system to connect production directly to consumption. \circled2 The need for more expansion of landing markets and terminal market facilities. Solutions to the problems of the Korean fishery are made possible through effective functioning of cooperative marketing activities of fishery products. The marketing concept of fishermen's cooperative lies in the satisfaction of consumer needs. According to the marketing concept fishermen's cooperative should try to satisfy customer's needs through a coodinated set of activities that allows the organization to achieve its goal. Providing satisfaction to customers is the major trust of the marketing concept. To do this, a business must find out what will satisfy customers. With this information the cooperative sells to the greatest possible number of customers through the most efficient sales and marketing channels. Economic rationality of fishermen's cooperative marketing lies in reduction of marketing cost and elimination of intermediate institutions. Cooperative marketing and direct marketing are both indispensable marketing factors for a new cooperative organization among the manu ways. The cooperation between the fishermen's cooperative and the others cooperative, and vertical marketing system are the most necessary ones. Propulsion of cooperative marketing system could not be successful without the support of the marketing instituion's help. Consequently, successful cooperative marketing ought to lead to the necessity not only for the improvement of marketing organization, but for the application of a new marketing concept in the fishermen's cooperative.

  • PDF

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

Exploring the Temporal Relationship Between Traffic Information Web/Mobile Application Access and Actual Traffic Volume on Expressways (웹/모바일-어플리케이션 접속 지표와 TCS 교통량의 상관관계 연구)

  • RYU, Ingon;LEE, Jaeyoung;CHOI, Keechoo;KIM, Junghwa;AHN, Soonwook
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • In the recent years, the internet has become accessible without limitation of time and location to anyone with smartphones. It resulted in more convenient travel information access both on the pre-trip and en-route phase. The main objective of this study is to conduct a stationary test for traffic information web/mobile application access indexes from TCS (Toll Collection System); and analyzing the relationship between the web/mobile application access indexes and actual traffic volume on expressways, in order to analyze searching behavior of expressway related travel information. The key findings of this study are as follows: first, the results of ADF-test and PP-test confirm that the web/mobile application access indexes by time periods satisfy stationary conditions even without log or differential transformation. Second, the Pearson correlation test showed that there is a strong and positive correlation between the web/mobile application access indexes and expressway entry and exit traffic volume. In contrast, truck entry traffic volume from TCS has no significant correlation with the web/mobile application access indexes. Third, the time gap relationship between time-series variables (i.e., concurrent, leading and lagging) was analyzed by cross-correlation tests. The results indicated that the mobile application access leads web access, and the number of mobile application execution is concurrent with all web access indexes. Lastly, there was no web/mobile application access indexes leading expressway entry traffic volumes on expressways, and the highest correlation was observed between webpage view/visitor/new visitor/repeat visitor/application execution counts and expressway entry volume with a lag of one hour. It is expected that specific individual travel behavior can be predicted such as route conversion time and ratio if the data are subdivided by time periods and areas and utilizing traffic information users' location.

A Need Assessment on Establishment of Oriental Health Promotion Center (한방건강증진센터 설립에 대한 인식 및 요구조사)

  • Lee, Hyang-Yeon;Kim, Kwuy-Bun;Cho, Kyoul-Ja;Shin, Hye-Sook;Kim, Kwang-Joo;Moon, Heui-Ja;Park, Shin-Ae;Kim, Yoon-Hee;Kang, Hyun-Sook
    • Journal of East-West Nursing Research
    • /
    • v.5 no.1
    • /
    • pp.90-101
    • /
    • 2000
  • The study attempts to examine the degree of cognition and demand on health promotion center of oriental nursing. It puts unique nursing intervention using traditional health promotion connected with oriental medicine to practical use for residents' health promotion and prevention of disease. With the study design of cross-sectional descriptive study, 516 residents who live in 26 Dongs, Dongdaemoon-gu were selected. The tool of study consists of 30 questions which the study team made for the degree of cognition and demand on health promotion center of oriental nursing. Cronbach's $\alpha$ in the degree of cognition was .8028. Collection of research data had been done from October 1 to October 30, 1999 with help of Dongdaemoon-gu office after pretest from 20 residents. Collected data were analyzed into the number and percentage in the characteristic of a subject and connected with demand on the establishment of center, the mean and the standard deviation in the degree of cognition and F-tests in the difference of the degree of cognition by characteristics. The results were as follow; 1) The characteristic of subject of this study was male 50.6%, and average age was 38.5 years old and 30-39 years old occupied the highest percentage with 31.6%. The married were 71.8%, over high school graduates was 85.6%, monthly income from 500 thousand won to 2 million won was 86.1%. 50.8% was the type living with parents, children and sibling. 2) When they were sick, the institution which residents used at first was a pharmacy(69.2%) and hospital(27.5%), but oriental medicine hospital was just 1.4%. As for subjective health condition, 82.5% answered over average, and 28.7% answered that they had chronic illness such as arthritis, chronic digestion problem, hypertension and so on. As for information collection on health, mass communication(34.9%) and medically concerned people(28.1%) occupied relatively high rate. Free health diagnosis system(36.8%) and establishment of health promotion center(31.5%) among welfare programs that residents want to enjoy were high ranked. The rate using a special institution for health was 17.8%, and among these institutions, the rate using aerobic exercises, health center(7.0%) and steamed room(5.4%) was high. Besides, other institutions such as breathing at the abdomen, finger-pressure therapy, meridian massage, foot massage, and so on were being used. 3) As the average of the degree of cognition on health promotion center of oriental medicine was 2.92, the degree of cognition was medium. The description, "health promotion center of oriental medicine is necessary for health keeping of healthy people, including people who have a problem in health" showed the highest degree of cognition(3.04, ${\pm}0.64$). 4) As for the intention on using health promotion center of oriental nursing, 61.4% said "yes", "no" was just 1.4%. The services that people relatively high wanted to be served from the center were measures reducing stress(68.0%) (relaxation therapy, meditation, breathing at the abdomen and so on), acupuncture(66.5%), finger-pressure(61.6%), moxibustion(57.6%), meridian massage(44.2%), postpartum care(40.3%) and so on. 5) As for the degree of cognition on the establishment of health promotion center of oriental nursing by characteristics of subject, there was significant difference(F=4.03, p=.046) between male(3.01) and female(2.91). But there was no significant difference by age, marital status, level of educational achievement and monthly income. As the above result, cognition on the establishment of health promotion center of oriental nursing was relatively low because people were not familiar with about the health promotion center of oriental nursing yet. However once the center will be established, the degree of demand on the center will be relatively high. So positive advertisement will be necessary, and the management of useful programs will be also required in order to make people recognize the advantage when they actually will use the center. On the other hand, as the subject of the study consists of many young people of below 30, the health problem came to be low. And in the case of sampling, the study using random sampling that can represent population will be required.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

The Effects of CEO's Narcissism on Diversification Strategy and Performance in an Economic Downturn: The Moderating Role of Corporate Governance System (경기침체기의 다각화전략과 성과에 대한 최고경영자 나르시시즘의 영향과 기업지배구조의 조절효과에 대한 연구)

  • Yoo, Jae-Wook
    • Management & Information Systems Review
    • /
    • v.35 no.4
    • /
    • pp.1-19
    • /
    • 2016
  • The researchers in strategic management have focused on identifying the effects of CEO's demographic characteristics and experience on the strategic choices and performance of firms. On the other hand, they have failed to identifying the effects of CEO's psychological characteristics on them because of the difficulties over data collection and measurement for variables. To overcome this limitation of prior researches, this study is designed to achieve two specific objectives. The first is to examine the effect of CEO narcissism on diversification strategy and performance of listed corporations on Korean securities market in an economic downturn. The other is to examine the moderating effects of various corporate governance systems that are related to board and/or ownership structures on those relationships. The empirical setting for this study was drawn from a multi-year(2011~2014) sample of large listed corporations in Korean securities market. To achieve the objectives, the hypotheses of research are analyzed by implementing multiple regression analyses in two separate models. The results of these analyses show that CEO narcissism is positively related to the diversification of listed large corporations in Korean securities market. Regrading the moderating effects, the stake of institutional investors weakens the positive relationship between CEO narcissism and firm's diversification. The findings of this research imply that CEO narcissism can intensify the tendency of Korean corporations to adopt high-risk and high return strategy in an economic downturn. Thus, firms might be able to use CEO narcissism to drastically restructure the business portfolio in an economic downturn. However, Korean corporations should be very cautions to maximize the positive effect of CEO narcissism. They might be use the institutional investors as their corporate governance system to monitor and control the opportunism of CEO in the decision for diversification in an economic downturn.

  • PDF

A Machine Learning-based Total Production Time Prediction Method for Customized-Manufacturing Companies (주문생산 기업을 위한 기계학습 기반 총생산시간 예측 기법)

  • Park, Do-Myung;Choi, HyungRim;Park, Byung-Kwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.177-190
    • /
    • 2021
  • Due to the development of the fourth industrial revolution technology, efforts are being made to improve areas that humans cannot handle by utilizing artificial intelligence techniques such as machine learning. Although on-demand production companies also want to reduce corporate risks such as delays in delivery by predicting total production time for orders, they are having difficulty predicting this because the total production time is all different for each order. The Theory of Constraints (TOC) theory was developed to find the least efficient areas to increase order throughput and reduce order total cost, but failed to provide a forecast of total production time. Order production varies from order to order due to various customer needs, so the total production time of individual orders can be measured postmortem, but it is difficult to predict in advance. The total measured production time of existing orders is also different, which has limitations that cannot be used as standard time. As a result, experienced managers rely on persimmons rather than on the use of the system, while inexperienced managers use simple management indicators (e.g., 60 days total production time for raw materials, 90 days total production time for steel plates, etc.). Too fast work instructions based on imperfections or indicators cause congestion, which leads to productivity degradation, and too late leads to increased production costs or failure to meet delivery dates due to emergency processing. Failure to meet the deadline will result in compensation for delayed compensation or adversely affect business and collection sectors. In this study, to address these problems, an entity that operates an order production system seeks to find a machine learning model that estimates the total production time of new orders. It uses orders, production, and process performance for materials used for machine learning. We compared and analyzed OLS, GLM Gamma, Extra Trees, and Random Forest algorithms as the best algorithms for estimating total production time and present the results.