• Title/Summary/Keyword: 과학기술 데이터

Search Result 2,575, Processing Time 0.033 seconds

Prediction of Ship Travel Time in Harbour using 1D-Convolutional Neural Network (1D-CNN을 이용한 항만내 선박 이동시간 예측)

  • Sang-Lok Yoo;Kwang-Il Ki;Cho-Young Jung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.275-276
    • /
    • 2022
  • VTS operators instruct ships to wait for entry and departure to sail in one-way to prevent ship collision accidents in ports with narrow routes. Currently, the instructions are not based on scientific and statistical data. As a result, there is a significant deviation depending on the individual capability of the VTS operators. Accordingly, this study built a 1d-convolutional neural network model by collecting ship and weather data to predict the exact travel time for ship entry/departure waiting for instructions in the port. It was confirmed that the proposed model was improved by more than 4.5% compared to other ensemble machine learning models. Through this study, it is possible to predict the time required to enter and depart a vessel in various situations, so it is expected that the VTS operators will help provide accurate information to the vessel and determine the waiting order.

  • PDF

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

A MapReduce-based kNN Join Query Processing Algorithm for Analyzing Large-scale Data (대용량 데이터 분석을 위한 맵리듀스 기반 kNN join 질의처리 알고리즘)

  • Lee, HyunJo;Kim, TaeHoon;Chang, JaeWoo
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.504-511
    • /
    • 2015
  • Recently, the amount of data is rapidly increasing with the popularity of the SNS and the development of mobile technology. So, it has been actively studied for the effective data analysis schemes of the large amounts of data. One of the typical schemes is a Voronoi diagram based on kNN join algorithm (VkNN-join) using MapReduce. For two datasets R and S, VkNN-join can reduce the time of the join query processing involving big data because it selects the corresponding subset Sj for each Ri and processes the query with them. However, VkNN-join requires a high computational cost for constructing the Voronoi diagram. Moreover, the computational overhead of the VkNN-join is high because the number of the candidate cells increases as the value of the k increases. In order to solve these problems, we propose a MapReduce-based kNN-join query processing algorithm for analyzing the large amounts of data. Using the seed-based dynamic partitioning, our algorithm can reduce the overhead for constructing the index structure. Also, it can reduce the computational overhead to find the candidate partitions by selecting corresponding partitions with the average distance between two seeds. We show that our algorithm has better performance than the existing scheme in terms of the query processing time.

Obstacle Avoidance of Unmanned Surface Vehicle based on 3D Lidar for VFH Algorithm (무인수상정의 장애물 회피를 위한 3차원 라이다 기반 VFH 알고리즘 연구)

  • Weon, Ihn-Sik;Lee, Soon-Geul;Ryu, Jae-Kwan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.945-953
    • /
    • 2018
  • In this paper, we use 3-D LIDAR for obstacle detection and avoidance maneuver for autonomous unmanned operation. It is aimed to avoid obstacle avoidance in unmanned water under marine condition using only single sensor. 3D lidar uses Quanergy's M8 sensor to collect surrounding obstacle data and includes layer information and intensity information in obstacle information. The collected data is converted into a three-dimensional Cartesian coordinate system, which is then mapped to a two-dimensional coordinate system. The data including the obstacle information converted into the two-dimensional coordinate system includes noise data on the water surface. So, basically, the noise data generated regularly is defined by defining a hypothetical region of interest based on the assumption of unmanned water. The noise data generated thereafter are set to a threshold value in the histogram data calculated by the Vector Field Histogram, And the noise data is removed in proportion to the amount of noise. Using the removed data, the relative object was searched according to the unmanned averaging motion, and the density map of the data was made while keeping one cell on the virtual grid map. A polar histogram was generated for the generated obstacle map, and the avoidance direction was selected using the boundary value.

A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services (안전한 AI 서비스를 위한 국내 정책 및 가이드라인 개선방안 연구)

  • Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.975-987
    • /
    • 2023
  • With the advancement of Artificial Intelligence (AI) technologies, the provision of data-driven AI services that enable automation and intelligence is increasing across industries, raising concerns about the AI security risks that may arise from the use of AI. Accordingly, Foreign countries recognize the need and importance of AI regulation and are focusing on developing related policies and regulations. This movement is also happening in Korea, and AI regulations have not been specified, so it is necessary to compare and analyze existing policy proposals or guidelines to derive common factors and identify complementary points, and discuss the direction of domestic AI regulation. In this paper, we investigate AI security risks that may arise in the AI life cycle and derive six points to be considered in establishing domestic AI regulations through analysis of each risk. Based on this, we analyze AI policy proposals and recommendations in Korea and validate additional issues. In addition, based on a review of the main content of AI laws in the US and EU and the analysis of this paper, we propose measures to improve domestic guidelines and policies in the field of AI.

XML Document Editing System for Structural Processing of the Digital Document to Including Mathematical Formula (수식을 포함한 전자문헌의 구조적 처리를 위한 XML 문서편집시스템)

  • 윤화묵;유범종;김창수;정회경
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.4
    • /
    • pp.96-111
    • /
    • 2002
  • A lot of accumulated data of many quantity exist within a institution or an organization, but most data is remained in form of standardization as each institution or organization. There are difficulty in exchange and share of information. New concept of knowledge information resource management to overcome this disadvantage was introduced, and the digitization of knowledge information resources to share and manage accumulated data is been doing. Specially, in science technic or education scholarship it, the tendency that importing XML to process necessary data to exchange and share of knowledge information resources structurally, and limitation of back for search and indexing or reusability is happened according as expression of great many mathematics used inside electron document of these sphere is processed to nonstructural data of image or text and so on. There is interest converged in processing of mathematics that use MathML to overcome this, and we require the solution to be able to process MathML easily and efficiently on structural document. In this paper, designed and implemented of XML document editing system which easy structural process of electronic document for knowledge information resources, and create and express MathML easily on structural document without expert knowledge about MathML.

An Empirical Study on Future New Technology in Defense Unmanned Robot (국방 무인로봇 분야 미래 신기술에 관한 실증연구)

  • Kim, DoeHun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.611-616
    • /
    • 2018
  • With the recent increase in awareness of the diversification of patterns of warfare and security, technological evolution is occurring in the field of autonomous defense robots. As defense science and technology develops with the development of the concept of military utilization focusing on human lives and economic operation, the importance of autonomous robots in the effect-oriented future battlefield is increasing. The major developed countries have developed core technologies, investment strategies, priorities, data securing strategies and infrastructure development related to the field of autonomous defense robots, and research activities such as technology planning and policy strategy for autonomous defense robots in Korea have already begun. In addition, the field of autonomous defense robots encompasses technologies that represent the fourth industrial revolution, such as artificial intelligence, big data, and virtual reality, and so the expectations for this future area of technology are very high. It is difficult to predict the path of technological development due to the increase in the demand for new rather than existing technology. Moreover, the selection and concentration of strategic R&D is required due to resource constraints. It is thought that a preemptive response is needed. This study attempts to derive 6 new technologies that will shape the future of autonomous defense robots and to obtain meaningful results through an empirical study.

A study on improving self-inference performance through iterative retraining of false positives of deep-learning object detection in tunnels (터널 내 딥러닝 객체인식 오탐지 데이터의 반복 재학습을 통한 자가 추론 성능 향상 방법에 관한 연구)

  • Kyu Beom Lee;Hyu-Soung Shin
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.2
    • /
    • pp.129-152
    • /
    • 2024
  • In the application of deep learning object detection via CCTV in tunnels, a large number of false positive detections occur due to the poor environmental conditions of tunnels, such as low illumination and severe perspective effect. This problem directly impacts the reliability of the tunnel CCTV-based accident detection system reliant on object detection performance. Hence, it is necessary to reduce the number of false positive detections while also enhancing the number of true positive detections. Based on a deep learning object detection model, this paper proposes a false positive data training method that not only reduces false positives but also improves true positive detection performance through retraining of false positive data. This paper's false positive data training method is based on the following steps: initial training of a training dataset - inference of a validation dataset - correction of false positive data and dataset composition - addition to the training dataset and retraining. In this paper, experiments were conducted to verify the performance of this method. First, the optimal hyperparameters of the deep learning object detection model to be applied in this experiment were determined through previous experiments. Then, in this experiment, training image format was determined, and experiments were conducted sequentially to check the long-term performance improvement through retraining of repeated false detection datasets. As a result, in the first experiment, it was found that the inclusion of the background in the inferred image was more advantageous for object detection performance than the removal of the background excluding the object. In the second experiment, it was found that retraining by accumulating false positives from each level of retraining was more advantageous than retraining independently for each level of retraining in terms of continuous improvement of object detection performance. After retraining the false positive data with the method determined in the two experiments, the car object class showed excellent inference performance with an AP value of 0.95 or higher after the first retraining, and by the fifth retraining, the inference performance was improved by about 1.06 times compared to the initial inference. And the person object class continued to improve its inference performance as retraining progressed, and by the 18th retraining, it showed that it could self-improve its inference performance by more than 2.3 times compared to the initial inference.

A Study on the Concept and Characteristics of Metaverse based NFT Art - Focused on <Hybrid Nature> (메타버스 기반 NFT 아트 작품 사례 연구 - <하이브리드 네이처>를 중심으로)

  • Bosul Kim;Min Ji Kim
    • Trans-
    • /
    • v.14
    • /
    • pp.1-33
    • /
    • 2023
  • In the Web 3.0 era, the third generation of web technologies that uses blockchain technology to give creators ownership of data, metaverse is a crucial trend for developing a creator economy. Web 3.0 aims for a value in which content creators are compensated from participation without being dependent on the platform. Blockchain NFT technology is crucial in metaverse, a vital component of Web 3.0, to ensure the ownership of digital assets. Based on the theory that investigates the concept and characteristics of metaverse, this study identifies five features of the metaverse based NFT art ①'Continuity', ②'Presence', ③ 'Concurrency', ④'Economy', ⑤ 'Application of technology'. By focusing on metaverse based NFT art <Hybrid Nature> case study, we analyzed how the concepts and characteristics of the metaverse and NFT art were reflected in the work. This study focuses on the concept of NFT art, which is emerging at the intersection of art, technology and industry, and emphasizes the importance of finding creative, aesthetic, and cultural values rather than the NFT art's potential for financial gain. It is still in its early stage for academic studies to focus on the aesthetic qualities of NFT art. Future academics and researchers can find this study to gain deeper understanding of the traits and artistic, creative aspects of metaverse based NFT art.

Tour-based Personalized Trip Analysis and Calibration Method for Activity-based Traffic Demand Modelling (활동기반 교통수요 모델링을 위한 투어기반 통행분석 및 보정방안)

  • Yegi Yoo;Heechan Kang;Seungmo Yoo;Taeho Oh
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.6
    • /
    • pp.32-48
    • /
    • 2023
  • Autonomous driving technology is shaping the future of personalized travel, encouraging personalized travel, and traffic impact could be influenced by individualized travel behavior during the transition of driving entity from human to machine. In order to evaluate traffic impact, it is necessary to estimate the total number of trips based on an understanding of individual travel characteristics. The Activity-based model(ABM), which allows for the reflection of individual travel characteristics, deals with all travel sequences of an individual. Understanding the relationship between travel and travel must be important for assessing traffic impact using ABM. However, the ABM has a limitation in the data hunger model. It is difficult to adjust in the actual demand forecasting. Therefore, we utilized a Tour-based model that can explain the relationship between travels based on household travel survey data instead. After that, vehicle registration and population data were used for correction. The result showed that, compared to the KTDB one, the traffic generation exhibited a 13% increase in total trips and approximately 9% reduction in working trips, valid within an acceptable margin of error. As a result, it can be used as a generation correction method based on Tour, which can reflect individual travel characteristics, prior to building an activity-based model to predict demand due to the introduction of autonomous vehicles in terms of road operation, which is the ultimate goal of this study.