• Title/Summary/Keyword: 모바일 지도

Search Result 4,367, Processing Time 0.035 seconds

A Study on the Use and Risk of Artificial Intelligence (Focusing on the eproperty appraiser industry) (인공지능의 활용과 위험성에 관한 연구 (감정 평가 산업 중심으로))

  • Hong, Seok-Do;You, Yen-Yoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.81-88
    • /
    • 2022
  • This study is to investigate the perception of domestic appraisers about the possibility of using artificial intelligence (AI) and related risks from the use of AI in the appraisal industry. We conducted a mobile survey of evaluators from February 10 to 18, 2022. We collected survey data from 193 respondents. Frequency analysis and multiple response analysis were performed for basic analysis. When AI is used in the appraisal industry, factor analysis was used to analyze various types of risks. Although appraisers have a positive perception of AI introduction in the appraisal industry, they considered collateral, consulting, and taxation, mainly in areas where AI is likely to be used and replaced, mainly negative effects related to job losses and job replacement. They were more aware of the alternative risks caused by AI in the field of human labor. I was very aware of responsibilities, privacy and security, and the risk of technical errors. However, fairness, transparency, and reliability risks were generally perceived as low risk issues. Existing studies have mainly studied analysis methods that apply AI to mass evaluation models, but this study focused on the use and risk of AI. Understanding industry experts' perceptions of AI utilization will help minimize potential risks when AI is introduced on a large scale.

Single Image Super Resolution Based on Residual Dense Channel Attention Block-RecursiveSRNet (잔여 밀집 및 채널 집중 기법을 갖는 재귀적 경량 네트워크 기반의 단일 이미지 초해상도 기법)

  • Woo, Hee-Jo;Sim, Ji-Woo;Kim, Eung-Tae
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.429-440
    • /
    • 2021
  • With the recent development of deep convolutional neural network learning, deep learning techniques applied to single image super-resolution are showing good results. One of the existing deep learning-based super-resolution techniques is RDN(Residual Dense Network), in which the initial feature information is transmitted to the last layer using residual dense blocks, and subsequent layers are restored using input information of previous layers. However, if all hierarchical features are connected and learned and a large number of residual dense blocks are stacked, despite good performance, a large number of parameters and huge computational load are needed, so it takes a lot of time to learn a network and a slow processing speed, and it is not applicable to a mobile system. In this paper, we use the residual dense structure, which is a continuous memory structure that reuses previous information, and the residual dense channel attention block using the channel attention method that determines the importance according to the feature map of the image. We propose a method that can increase the depth to obtain a large receptive field and maintain a concise model at the same time. As a result of the experiment, the proposed network obtained PSNR as low as 0.205dB on average at 4× magnification compared to RDN, but about 1.8 times faster processing speed, about 10 times less number of parameters and about 1.74 times less computation.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Studies on Korean Digital Fantasy Film -Genealogy, Case, and Social Meaning (한국 디지털 판타지 영화 연구 -계보, 표본, 그리고 사회적 의미)

  • Kim, Chung-Kang
    • Journal of Popular Narrative
    • /
    • v.26 no.1
    • /
    • pp.41-76
    • /
    • 2020
  • Recently, the cinema industry faced a crisis on the rise of various media platforms such as Netflix, Amazon Prime, IPTV, and Kakao Page. The rate of film release in the theater has become ever shorter, and the secondary consumption of film through IPTV, tablet, PC, or mobile has seen a drastic increase. In the midst of this new media-geography, the most significant change in recent years would be the rise of the 'fantasy film' genre. This paper explores the conditions and characteristics of fantasy films in the way in which the genre has been constituted, and delves into particular aspects that its contents contain. This is an attempt to understand the sociology of the birth of a new genre. In this process, this paper will ask two frequently raised questions in regard to this genre. The first is to ask whether we can discern fantasy from reality, and the second is to examine whether the fantasy genre implicates certain social subversion. These two questions aim to discover how fantasy forms a relationship with reality and what this means. To do so, this paper will trace the genealogy of the fantasy film genre in Korea and analyze recent big hits such as the series as the model case of digital fantasy film. Through this exploration, this paper will be able to provide a new sociology of the fantasy film production and consumption in the 21st century Korea.

A Study on the Development of IoT Inspection System for Gas Leakage Inspection in Kitchen Gas Range Built-in Method (주방 가스레인지 빌트인 방식에서 가스 누출검사를 위한 IoT 검사 시스템 개발에 관한 연구)

  • Kang, Dae Guk;Choi, Young Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.283-290
    • /
    • 2022
  • In this study, an IoT inspection system that can be linked with a server was developed using a gas timer and ESP-01 Wi-Fi module installed on a gas valve in the home. The server environment of the gas leak IoT inspection system was installed with APM (Apache, PHP, MySQL) to collect gas pressure data by generation so that leakage checks could be performed. In order to control the gas leak IoT inspection system, the app inventory was used to manage the gas leak check value in real time. In addition, user convenience has been enhanced so that membership management, WiFi settings, and leakage check values can be checked through mobile apps. In order to manage subscribers by region, the user list was checked by logging in in in the administrator mode so that the information on whether or not the leak test was conducted and the results could be provided. In addition, when the user presses the gas leak check button, the pressure is automatically checked, and the measured value is stored in the server, and when a gas leak occurs, the leakage check is performed after alarm and repair so that it can be used if normal. In addition, in order to prevent overlapping membership, membership management can be performed based on MAC addresses.

Improvement Mechanism for Automatic Web Vulnerability Diagnosis (웹취약점 자동진단 개선방안)

  • Kim, Tae-Seop;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.125-134
    • /
    • 2022
  • Due to the development of smartphone technology, as of 2020, 91.9% of people use the Internet[1] to frequently acquire information through websites and mobile apps. As the number of homepages in charge of providing information is increasing every year, the number of applications for web vulnerability diagnosis, which diagnoses the safety of homepages, is also increasing. In the existing web vulnerability check, the number of diagnostic personnel should increase in proportion to the number of homepages that need diagnosis because the diagnosticians manually test the homepages for vulnerabilities. In reality, however, there is a limit to securing a web vulnerability diagnosis manpower, and if the number of diagnosis manpower is increased, a lot of costs are incurred. To solve these problems, an automatic diagnosis tool is used to replace a part of the manual diagnosis. This paper explores a new method to expand the current automatic diagnosis range. In other words, automatic diagnosis possible items were derived by analyzing the impact of web vulnerability diagnosis items. Furthermore, automatic diagnosis identified possible items through comparative analysis of diagnosis results by performing manual and automatic diagnosis on the website in operation. In addition, it is possible to replace manual diagnosis for possible items, but not all vulnerability items, through the improvement of automatic diagnosis tools. This paper will explore some suggestions that can help improve plans to support and implement automatic diagnosis. Through this, it will be possible to contribute to the creation of a safe website operating environment by focusing on the parts that require precise diagnosis.

Analysis on the Importance Rank of Service Components of Autonomous Mobility-on-Demand Service by Potential User Groups (수요응답형 자율주행 대중교통 서비스의 잠재적 이용자 집단 간 서비스 요소별 중요도에 관한 분석)

  • Sungju Seo;Jinhee Kim;Jaehyung Lee;Byungsoo Yang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.177-193
    • /
    • 2022
  • In the near future, it is expected that the use of autonomous mobility-on-demand services will increase. Considering its complicated service components, including vehicle convenience, driving and matching speed, and platform convenience, the priorities of them will need to be determined for a successful establishment. In this context, this study examined the importance rank of each service component through an online survey of potential users of autonomous mobility-on-demand services. As a result of the AHP (Analytic Hierarchy Process) with respect to the upper-level components, driving and matching speed component is selected as most important, followed by platform convenience and vehicle convenience. Mean rank analysis with respect to lower-level components showed that the in-vehicle congestion level of vehicle convenience, waiting time of driving and matching speed, and pre-booking availability of platform convenience each ranked first. Additional analysis regarding each group was conducted to establish a group-specific strategy. As a result, it would be better to focus on a vehicle than a mobile platform when designing services for the region with a high proportion of the older. Moreover, it is recommended to speed up the driving and matching speeds more than the current public transport, alleviate in-vehicle congestion, and enable the users to book the schedule in advance.

A Research on Autonomous Mobile LiDAR Performance between Lab and Field Environment (자율주행차량 모바일 LiDAR의 실내외 성능 비교 연구)

  • Ji yoon Kim;Bum jin Park;Jisoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.194-210
    • /
    • 2023
  • LiDAR plays a key role in autonomous vehicles, where it is used to detect the environment in place of the driver's eyes, and its role is expanding. In recent years, there has been a growing need to test the performance of LiDARs installed in autonomous vehicles. Many LiDAR performance tests have been conducted in simulated and indoor(lab) environments, but the number of tests in outdoor(field) and real-world road environments has been minimal. In this study, we compared LiDAR performance under the same conditions lab and field to determine the relationship between lab and field tests and to establish the characteristics and roles of each test environment. The experimental results showed that LiDAR detection performance varies depending on the lighting environment (direct sunlight, led) and the detected object. In particular, the effect of decreasing intensity due to increasing distance and rainfall is greater outdoors, suggesting that both lab and field experiments are necessary when testing LiDAR detection performance on objects. The results of this study are expected to be useful for organizations conducting research on the use of LiDAR sensors and facilities for LiDAR sensors.

A DEVS-based Modeling & Simulation Methodology of Enabling Node Mobility for Ad Hoc Network (노드 이동성을 고려한 애드 혹 네트워크의 이산 사건 시스템 기반 모델링 및 시뮬레이션 방법론)

  • Song, Sang-Bok;Lee, Kyou-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.127-136
    • /
    • 2009
  • Modeling and Simulation, especially in mobile ad hoc network(MANET), are the most effective way to analyze performance or optimize system parameters without establishing real network environment. Focusing mainly on overall network behaviors in MANET concerns dynamics of network transport operations, which can efficiently be characterized with event based system states rather than execution details of protocols. We thus consider the network as a discrete event system to analyze dynamics of network transport performance. Zeigler's set-theoretic DEVS(Discrete Event Systems Specification) formalism can support specification of a discrete event system in hierarchical, modular manner. The DEVSim++ simulation environment can not only provide a rigorous modeling methodology based on the DEVS formalism but also support modelers to develop discrete event models using the hierarchical composition methodology in object-orientation. This environment however hardly supports to specify connection paths of network nodes, which are continuously altered due to mobility of nodes. This paper proposes a DEVS-based modeling and simulation methodology of enabling node mobility, and develops DEVS models for the mobile ad hoc network. We also simulate developed models with the DEVSim++ engine to verify the proposal.

Development of Mental Health Self-Care App for University Student (대학생을 위한 정신건강 자가관리 어플리케이션 개발)

  • Kang, Gwang-Soon;Roh, Sun-Sik
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.1
    • /
    • pp.25-34
    • /
    • 2019
  • The purpose of this study is to develop a mobile app for mental health self care of university student. User centered design is a research design that applies the subject's needs assessment, analysis, design, development, evaluation, modification and supplement to suit the subjects. In order to manage the mental health of university students, they consisted of four main areas of mental health problems: drinking, sleeping, depression, and stress. It is designed to enable self test content, analysis and notification of inspection results, and management plan for current status of each area. Based on this, I developed an Android based mental health self-care Application. The subject can enter his or her mental health status data to explain the normal or risk level for each result, and the subject can then select the appropriate intervention method that he or she can perform. In addition, we developed a mental health self care calendar that can display the present status of each of the four areas on a day by day basis, and the current status can be expressed in an integrated manner through animations and status bars. The purpose of this study was to develop a mental health self-care app that can be improved by continuous and improved programs.