• Title/Summary/Keyword: internet Governance

Search Result 77, Processing Time 0.019 seconds

Vehicle detection and tracking algorithm based on improved feature extraction

  • Xiaole Ge;Feng Zhou;Shuaiting Chen;Gan Gao;Rugang Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2642-2664
    • /
    • 2024
  • In the process of modern traffic management, information technology has become an important part of intelligent traffic governance. Real-time monitoring can accurately and effectively track and record vehicles, which is of great significance to modern urban traffic management. Existing tracking algorithms are affected by the environment, viewpoint, etc., and often have problems such as false detection, imprecise anchor boxes, and ID switch. Based on the YOLOv5 algorithm, we improve the loss function, propose a new feature extraction module to obtain the receptive field at different scales, and do adaptive fusion with the SGE attention mechanism, so that it can effectively suppress the noise information during feature extraction. The trained model improves the mAP value by 5.7% on the public dataset UA-DETRAC without increasing the amount of calculations. Meanwhile, for vehicle feature recognition, we adaptively adjust the network structure of the DeepSort tracking algorithm. Finally, we tested the tracking algorithm on the public dataset and in a realistic scenario. The results show that the improved algorithm has an increase in the values of MOTA and MT etc., which generally improves the reliability of vehicle tracking.

The Evolutionary Trends and Influential Factors Analysis of Agricultural Trade between South Korea and RCEP Member Countries

  • Qianli Wu;Jinyan Tian;Haiyan Yu;Ziyang Liu
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.73-86
    • /
    • 2024
  • With the acceleration of regional economic integration, the agricultural trade network within the RCEP region presents new opportunities and challenges for member countries. This study focuses on agricultural trade among RCEP members from 2011 to 2020, utilizing social network analysis to explore the structural characteristics and evolutionary trends of the trade network. Additionally, an extended gravity model is employed to empirically analyze the key factors influencing South Korea's agricultural trade with other member countries. The findings reveal that: (1) Agricultural trade relationships within the RCEP region are stable and mature, with high interconnectivity in the trade network, indicating a trend towards balanced development. (2) The positions of member countries within the agricultural trade network are characterized by both high density and heterogeneity. (3) South Korea's agricultural trade with RCEP member countries is positively influenced by the economic size, population size, and governance level of its trading partners, while South Korea's own indicators show no significant effect. The trade distance between South Korea and member countries also has a positive impact on agricultural trade. By combining social network analysis with an extended gravity model, this study provides a multi-faceted quantitative analysis of the RCEP agricultural trade network, offering new insights into regional agricultural trade. It also provides empirical evidence for agricultural trade cooperation between South Korea and other RCEP countries.

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

Roadmap Toward Certificate Program for Trustworthy Artificial Intelligence

  • Han, Min-gyu;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.59-65
    • /
    • 2021
  • In this paper, we propose the AI certification standardization activities for systematic research and planning for the standardization of trustworthy artificial intelligence (AI). The activities will be in two-fold. In the stage 1, we investigate the scope and possibility of standardization through AI reliability technology research targeting international standards organizations. And we establish the AI reliability technology standard and AI reliability verification for the feasibility of the AI reliability technology/certification standards. In the stage 2, based on the standard technical specifications established in the previous stage, we establish AI reliability certification program for verification of products, systems and services. Along with the establishment of the AI reliability certification system, a global InterOp (Interoperability test) event, an AI reliability certification international standard meetings and seminars are to be held for the spread of AI reliability certification. Finally, TAIPP (Trustworthy AI Partnership Project) will be established through the participation of relevant standards organizations and industries to overall maintain and develop standards and certification programs to ensure the governance of AI reliability certification standards.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

ESG Analysis in China and Korea Using Big Data Analysis - Perspectives on ESG Management in Asian Countries -

  • Yun-Pyo Hong;Sang-Hak Lee;Gi-Hwan Ryu
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.117-124
    • /
    • 2024
  • ESG is currently a global topic, meaning environmental, social, and governance, which are three important measures of socially responsible management. It is also having a great influence on improving competitiveness in the global market and enhancing corporate image. In this study, ESG in Korea was analyzed through big data, and four central keywords of ESG management in China based on Chinese data were derived. These four keywords are environment, management, corporate event, and quality certification. In addition, we want to understand the ESG perspective of China by studying ESG cases in China. Through this, we will be able to compare and analyze the differences between ESG approaches and key points between Korea and China.

Fabricator based on B+Tree for Metadata Management in Distributed Environment

  • Chae-Yeon Yun;Seok-Jae Moon
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.125-134
    • /
    • 2024
  • In a distributed environment, data fabric refers to the technology and architecture that provides data management, integration, and access in a consistent and unified manner. To build a data fabric, it is necessary to maintain data consistency, establish a data governance system, reduce structural differences between data sources, and provide a unified view. In this paper, we propose the Fabricator system, a technology that provides data management and access in a consistent and unified manner by building a metadata registry. Fabricator manages the addition and modification of metadata schemas and matching processes by designing a matching tool called MetaSB Manager that applies B+Tree. This allows real-time integration of various data sources in a distributed environment, maximizing the flexibility and usability of data.

Is this New Paradigm to International Information Order in 21th Century?: The Review of Historical Context and Agenda of World Summit on the Information Society (21세기 국제정보질서의 새로운 패러다임?: 정보사회 세계정상회의(WSIS)의 역사적 맥락과 의제 검토)

  • Kim, Eun-Gyoo
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.34-62
    • /
    • 2006
  • The World Summit on the Information Society (WSIS) was held in two phases. The first phase took place in Geneva, December 2003, and the second phase took place in Tunis, November 2005. The objective of the WSIS was to establish the foundations for an Information Society for all, reflecting all the different interests at stake. In relation to, this article explore the vision and paradigm of WSIS. For this, this article review the historical context of International information order and International agreements, and examine the issues of WSIS. As a result, I recognize, It is valuable that the process of WSIS for Global governance was held among governments and other stakeholders, i.e. the private sector, civil society and international organization. In addition, developing countries's voice are deeply reflected on the WSIS. It is noticeable that ITU played key role as coordinator. However, we are anxious that WSIS's vision for Information society have a bias toward Technology determinism. Eventually, this article argue that WSIS discourse is the lack of any serious and critical structural analysis of the politico-economic context.

  • PDF

A Study on the Failure Factors of Popular Use of International Domain Names (IDNs): Focusing on the International Standardization Process (다국어도메인의 대중화 실패 요인 탐색: 국제표준화 과정 분석을 통하여)

  • Lee, Jin-Rang
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.43-63
    • /
    • 2016
  • This research analyzes the international standardization process by observing the international communication sources in order to understand the reason of its current poor use. Using the 'organizing theory' frame, we observe the initial discourse on the need of internationalized domain names in ICANN and the process of negotiation for technical choice of layers. Lastly, we take Korean domain names as a case study in order to understand the conflict and the cooperation of different stakeholders. We summarize the factors of failure of IDN as follows. First, the need of IDN in the beginning was raised around non-English speaking countries, in Asia and Middle East, with the discourse on 'digital divide solution and cultural value' ICANN rather pursues the 'technical stability of Internet Infrastructure', which made its standardization take as long as 10 years. As a result, a variety of standards and services are proposed in the marketplace, which engendered inefficient competition and domain name-related disputes such as cybersquatting, technical instability and confusion of users. In addition, the government agencies fail to present the appropriate policies adjusting multiple interests of different stakeholders.

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel;Choi, Bo-Yun;Lee, Hong-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.98-115
    • /
    • 2012
  • New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.