• Title/Summary/Keyword: 기술 분류

Search Result 6,612, Processing Time 0.049 seconds

An Analysis of Artificial Intelligence Algorithms Applied to Rock Engineering (암반공학분야에 적용된 인공지능 알고리즘 분석)

  • Kim, Yangkyun
    • Tunnel and Underground Space
    • /
    • v.31 no.1
    • /
    • pp.25-40
    • /
    • 2021
  • As the era of Industry 4.0 arrives, the researches using artificial intelligence in the field of rock engineering as well have increased. For a better understanding and availability of AI, this paper analyzed the types of algorithms and how to apply them to the research papers where AI is applied among domestic and international studies related to tunnels, blasting and mines that are major objects in which rock engineering techniques are applied. The analysis results show that the main specific fields in which AI is applied are rock mass classification and prediction of TBM advance rate as well as geological condition ahead of TBM in a tunnel field, prediction of fragmentation and flyrock in a blasting field, and the evaluation of subsidence risk in abandoned mines. Of various AI algorithms, an artificial neural network is overwhelmingly applied among investigated fields. To enhance the credibility and accuracy of a study result, an accurate and thorough understanding on AI algorithms that a researcher wants to use is essential, and it is expected that to solve various problems in the rock engineering fields which have difficulty in approaching or analyzing at present, research ideas using not only machine learning but also deep learning such as CNN or RNN will increase.

Comparison of online video(OTT) content production technology based on artificial intelligence customized recommendation service (인공지능 맞춤 추천서비스 기반 온라인 동영상(OTT) 콘텐츠 제작 기술 비교)

  • CHUN, Sanghun;SHIN, Seoung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • In addition to the OTT video production service represented by Nexflix and YouTube, a personalized recommendation system for content with artificial intelligence has become common. YouTube's personalized recommendation service system consists of two neural networks, one neural network consisting of a recommendation candidate generation model and the other consisting of a ranking network. Netflix's video recommendation system consists of two data classification systems, divided into content-based filtering and collaborative filtering. As the online platform-led content production is activated by the Corona Pandemic, the field of virtual influencers using artificial intelligence is emerging. Virtual influencers are produced with GAN (Generative Adversarial Networks) artificial intelligence, and are unsupervised learning algorithms in which two opposing systems compete with each other. This study also researched the possibility of developing AI platform based on individual recommendation and virtual influencer (metabus) as a core content of OTT in the future.

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.

Analysis on CC Evaluation Demand and Selection of IT Security Products to be evaluated under CC Scheme in Korea (CC 평가수요 분석 및 차기 평가대상 제품군 선정)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.79-95
    • /
    • 2004
  • The Common Criteria can be used as a guideline for one CCRA member to avoid re-evaluating IT security products which were already evaluated by other CCRA members. In this paper, we have analyzed the evaluated IT security products under CC scheme in several nations, such as Unite States, Great Britain and Australia. and defined new category of the IT security products for the domestic CC evaluation. And we have analyzed the domestic and international market on the information security products, have conducted a poll to receive opinions and demands of the Korean industries for Korea policy decision maker to select the possible IT security products which will be evaluated in Korea under CC scheme. As a conclusion, we have selected 15 IT products based on the response to a poll by the industries, the market size, the evaluation amount demanded by the user, manufacturer, and evaluator, to select the possible IT security product under CC schemes in Korea during next 5 years. Moreover, the characteristics, the benefit, and the demerit of the selected IT products were analyzed. This paper can be used as a guideline document for Korea policy decision maker to select the IT products to be evaluated under CC scheme in Korea for next 5 years.

Development of Skills Framework for Information Security Workforce (정보보호 분야 직무체계 개발)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Yoo, Jin-Ho;Gee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.143-152
    • /
    • 2009
  • Successful industries that have maintained their competitiveness are characterized by well-established skills framework system. Skills framework establishes the agreed-upon, industry-identified knowledge, skills and abilities required to succeed in the workplace. Skills framework forms a solid foundation for the development of outcomes-based instruction and assessment, thus it benefits industry, students, educators and government. Each group has a major stake in the education of our students and in the efficient development of a productive workforce. Particularly in fast-changing fields like information security, relevant data that accurately reflect current and future knowledge and skills enable timely direction of resources, development and revision of industry-relevant curriculum, and efficient development of career information and job profiles. Skills framework occupies an indispensable position in any dialog concerning education or training in technical fields. In this study, we develop the skills framework for information security professionals.

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Analysis on the Type and Characteristics of Penalty in World Judo (세계유도 반칙 유형 및 특성 분석)

  • Lee, Seung Hun;Lee, Man Gi
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.607-614
    • /
    • 2020
  • The purpose of this study is to analyze the penalty types and characteristics of world judo players. Using a total of 19,889 penalties in 9,737 matches at the World Judo Grand Prix, the team draws a difference in the types and time of fouls according to gender, weight class and time. Results Both foul play and warning showed gender differences, and both men and women affected warning rates in weight class and time classification. In addition, fouls caused by non-combat behavior and camouflage attacks have a forward direction of time, and a low time of fouling by heavyweight athletes. Judo athletes and leaders expect to be used as basic data based on scientific data, such as training, skills, tactics and motivation, taking into account the characteristics of the foul type. Requires follow-up studies of scoring relationships and winning factors.

Data Processing of AutoML-based Classification Models for Improving Performance in Unbalanced Classes (불균형 클래스에서 AutoML 기반 분류 모델의 성능 향상을 위한 데이터 처리)

  • Lee, Dong-Joon;Kang, Ji-Soo;Chung, Kyungyong
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.49-54
    • /
    • 2021
  • With the recent development of smart healthcare technology, interest in daily diseases is increasing. However, healthcare data has an imbalance between positive and negative data. This is caused by the difficulty of collecting data because there are relatively many people who are not patients compared to patients with certain diseases. Data imbalances need to be adjusted because they affect performance in ongoing learning during disease prediction and analysis. Therefore, in this paper, We replace missing values through multiple imputation in detection models to determine whether they are prevalent or not, and resolve data imbalances through over-sampling. Based on AutoML using preprocessed data, We generate several models and select top 3 models to generate ensemble models.

Flight Routes Establishment Through the Operational Concept Analysis of Urban Air Mobility System (도심항공교통시스템 운용 개념 분석에 따른 운항경로 구축 연구)

  • Lee, Youngjae;Kwag, Tae Ho;Jeong, Gu Moon;Ahn, Jae Hyun;Chung, Bong Cheul;Lee, Jae-Woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.12
    • /
    • pp.1021-1031
    • /
    • 2020
  • With the advent of industry 4.0 technologies like the artificial intelligence and the autonomous flight, 'Urban Air Mobility (UAM)' is being considered as an effective alternative to resolve the ground urban traffic congestion. Accordingly, many companies in the world including Korea are investigating on the development of UAM vehicles and operation systems. In this study, after identifying and classifying the essential elements of the UAM operation, the UAM system operational concept has been derived, then detailed analyses for each element has been performed. Based on the conceptual analysis of the UAM operation system, UAM flight routes in Seoul and Gyeong-In area have been established and confirmed to be operable through the performance analysis of UAM vehicles. The flight route analysis in this study is expected to be applied to UAM flight routes establishment in various cities in the future.