• Title/Summary/Keyword: 서비스 지능화

Search Result 339, Processing Time 0.02 seconds

Improving Business Usability of XBRL Based on Semantic Web Approach (시맨틱 웹을 이용한 XBRL의 비즈니스 활용성 개선)

  • Jeon, Pyo-Jin;Lee, Myung-Jin;Kim, Woo-Ju;Hong, June-S.
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.1-23
    • /
    • 2010
  • It is crucially important to exchange and manage the financial information of an organization for the reason of complexity and diversity of information caused by its implicit information involved. Especially, according to the development of information technology, various approaches appeared to manage financial data of organization. For example, XBRL (Extensible Business Reporting Language) is one of the technologies dealing with the above criteria. Basically, XBRL is a business reporting language to define and exchange financial information, such as a financial statement of organization. XBRL is an international standard which enables the exchange of information between information providers and consumers by adding the tags involving the information of circumstantial factors of data. However, XBRL is not able to describe semantics because XBRL is fundamentally based on XML(Extensible Markup Language) having the purpose of expressing and structuring data. Therefore, this paper aims to enable semantic information to XBRL through the semantic technology. The objective of this paper is an ontologization of the knowledge to perform sharing, reusing, discovering, and inferring the knowledge described and conducted by XBRL. In order to achieve the above objective, this paper suggests the methodology for the ontologization of the category and instance document of XBRL. Furthermore, this paper points out the possibility of suggested methodology in a practical business through indicating the advantages of the knowledge described by XBRL.

Semantic Web based Multi-Dimensional Information Analysis System on the National Defense Weapons (시맨틱 웹 기반 국방무기 다차원 정보 분석 시스템)

  • Choi, Jung-Hwoan;Park, Jeong-Ho;Kim, Pyung;Lee, Seungwoo;Jung, Hanmin;Seo, Dongmin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.11
    • /
    • pp.502-510
    • /
    • 2012
  • As defense science and technology are developing, smart weapons are being developed continually. The collection and analysis of the future strategic weapon information from all over the world have become a greater priority because information sharing became active. So, a system to manage and analyze heterogeneous defense intelligence is required. Semantic Web is the next generation knowledge information management technology for integrating, searching and navigating heterogeneous knowledge resource. Recently, Semantic Web is wildly being used in intelligent information management system. Semantic Web supports the analysis with the high reliability because it supports the simple keyword search as well as the semantic based information retrieval. In this paper, we propose the semantic web based multi-dimensional information analysis system on the national defense weapons that constructs ontology for various weapons information such as weapon specifications, nations, manufacturers and technologies and searches and analyses the specific weapon based on ontology. The proposed system supports the semantic search and multi-dimensional information analysis based on the relations between weapon specifications. Also, our system improves the efficiency on acquiring smart weapon information because it is developed with ontology based on military experts' knowledge and various web documents related with various weapons and intelligent search service.

Study on the Standardization of Management Form through Integrated Management of CCTV (CCTV 통합관리를 위한 관리대장 표준화 연구)

  • PARK, Jeong-Woo;LEE, Seong-Ho;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2016
  • Closed-circuit television(CCTV) is a facility that forms the backbone of the ubiquitous services provided by the Integrated Management Center of the Ministry of Land, Infrastructure and Transport and the Integrated Control Center of the Ministry of the Interior. However, it is installed and managed according to different laws, as it is operated and managed by each department. Moreover, because there are no regulatory grounds for unified management of CCTV, each municipality responsible for the actual management manages it based on the individual standards of each department. Thus, the purpose of this study is to develop a standardized management form to establish an integrated management plan. The author inspected the existing situation by examining the legal system and public data and through hands-on worker interviews, and discovered the managed element by reviewing the specifications of the bidding system. The management form for integrated management comprises the above requirements along with the management histories and linkage of intelligent facilities. A uniform management form for integrated management containing specifications of the CCTVs installed by various departments is created, and is easily searched for facilities to check requirements for joint use. The result of this study can contribute to building the database of facility management system for integrated management of facilities at the integrated management center as well as for a detailed simulation of the selection of location of CCTV depending on the CCTV's specifications.

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

Study on the Current Status of Smart Garden (스마트가든의 인식경향에 관한 연구)

  • Woo, Kyung-Sook;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.49 no.2
    • /
    • pp.51-60
    • /
    • 2021
  • Modern society is becoming more informed and intelligent with the development of digital technology, in which humans, objects, and networks relate with each other. In accordance with the changing times, a garden system has emerged that makes it easy to supply the ideal temperature, humidity, sunlight, and moisture conditions to grow plants. Therefore, this study attempted to grasp the concept, perception, and trends of smart gardens, a recent concept. To achieve the purpose of this study, previous studies and text mining were used, and the results are as follows. First, the core characteristics of smart gardens are new gardens in which IoT technology and gardening techniques are fused in indoor and outdoor spaces due to technological developments and changes in people's lifestyles. As technology advances and the importance of the environment increases, smart gardens are becoming a reality due to the need for living spaces where humans and nature can co-exist. With the advent of smart gardens, it will be possible to contribute to gardens' vitalization to deal with changes in garden-related industries and people's lifestyles. Second, in current research related to smart gardens and users' experiences, the technical aspects of smart gardens are the most interesting. People value smart garden functions and technical aspects that enable a safe, comfortable, and convenient life, and subjective uses are emerging depending on individual tastes and the comfort with digital devices. Third, looking at the usage behavior of smart gardens, they are mainly used in indoor spaces, with edible plants are being grown. Due to the growing importance of the environment and concerns about climate change and a possible food crisis, the tendency is to prefer the cultivation of plants related to food, but the expansion of garden functions can satisfying users' needs with various technologies that allow for the growing of flowers. In addition, as users feel the shapes of smart gardens are new and sophisticated, it can be seen that design is an essential factor that helps to satisfy users. Currently, smart gardens are developing in terms of technology. However, the main components of the smart garden are the combination of humans, nature, and technology rather than focusing on growing plants conveniently by simply connecting potted plants and smart devices. It strengthens connectivity with various city services and smart homes. Smart gardens interact with the landscape of the architect's ideas rather than reproducing nature through science and technology. Therefore, it is necessary to have a design that considers the functions of the garden and the needs of users. In addition, by providing citizens indoor and urban parks and public facilities, it is possible to share the functions of communication and gardening among generations targeting those who do not enjoy 'smart' services due to age and bridge the digital device and information gap. Smart gardens have potential as a new landscaping space.

The Characteristics and Performances of Manufacturing SMEs that Utilize Public Information Support Infrastructure (공공 정보지원 인프라 활용한 제조 중소기업의 특징과 성과에 관한 연구)

  • Kim, Keun-Hwan;Kwon, Taehoon;Jun, Seung-pyo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-33
    • /
    • 2019
  • The small and medium sized enterprises (hereinafter SMEs) are already at a competitive disadvantaged when compared to large companies with more abundant resources. Manufacturing SMEs not only need a lot of information needed for new product development for sustainable growth and survival, but also seek networking to overcome the limitations of resources, but they are faced with limitations due to their size limitations. In a new era in which connectivity increases the complexity and uncertainty of the business environment, SMEs are increasingly urged to find information and solve networking problems. In order to solve these problems, the government funded research institutes plays an important role and duty to solve the information asymmetry problem of SMEs. The purpose of this study is to identify the differentiating characteristics of SMEs that utilize the public information support infrastructure provided by SMEs to enhance the innovation capacity of SMEs, and how they contribute to corporate performance. We argue that we need an infrastructure for providing information support to SMEs as part of this effort to strengthen of the role of government funded institutions; in this study, we specifically identify the target of such a policy and furthermore empirically demonstrate the effects of such policy-based efforts. Our goal is to help establish the strategies for building the information supporting infrastructure. To achieve this purpose, we first classified the characteristics of SMEs that have been found to utilize the information supporting infrastructure provided by government funded institutions. This allows us to verify whether selection bias appears in the analyzed group, which helps us clarify the interpretative limits of our study results. Next, we performed mediator and moderator effect analysis for multiple variables to analyze the process through which the use of information supporting infrastructure led to an improvement in external networking capabilities and resulted in enhancing product competitiveness. This analysis helps identify the key factors we should focus on when offering indirect support to SMEs through the information supporting infrastructure, which in turn helps us more efficiently manage research related to SME supporting policies implemented by government funded institutions. The results of this study showed the following. First, SMEs that used the information supporting infrastructure were found to have a significant difference in size in comparison to domestic R&D SMEs, but on the other hand, there was no significant difference in the cluster analysis that considered various variables. Based on these findings, we confirmed that SMEs that use the information supporting infrastructure are superior in size, and had a relatively higher distribution of companies that transact to a greater degree with large companies, when compared to the SMEs composing the general group of SMEs. Also, we found that companies that already receive support from the information infrastructure have a high concentration of companies that need collaboration with government funded institution. Secondly, among the SMEs that use the information supporting infrastructure, we found that increasing external networking capabilities contributed to enhancing product competitiveness, and while this was no the effect of direct assistance, we also found that indirect contributions were made by increasing the open marketing capabilities: in other words, this was the result of an indirect-only mediator effect. Also, the number of times the company received additional support in this process through mentoring related to information utilization was found to have a mediated moderator effect on improving external networking capabilities and in turn strengthening product competitiveness. The results of this study provide several insights that will help establish policies. KISTI's information support infrastructure may lead to the conclusion that marketing is already well underway, but it intentionally supports groups that enable to achieve good performance. As a result, the government should provide clear priorities whether to support the companies in the underdevelopment or to aid better performance. Through our research, we have identified how public information infrastructure contributes to product competitiveness. Here, we can draw some policy implications. First, the public information support infrastructure should have the capability to enhance the ability to interact with or to find the expert that provides required information. Second, if the utilization of public information support (online) infrastructure is effective, it is not necessary to continuously provide informational mentoring, which is a parallel offline support. Rather, offline support such as mentoring should be used as an appropriate device for abnormal symptom monitoring. Third, it is required that SMEs should improve their ability to utilize, because the effect of enhancing networking capacity through public information support infrastructure and enhancing product competitiveness through such infrastructure appears in most types of companies rather than in specific SMEs.