• Title/Summary/Keyword: 일반인공지능

Search Result 259, Processing Time 0.032 seconds

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Response Modeling for the Marketing Promotion with Weighted Case Based Reasoning Under Imbalanced Data Distribution (불균형 데이터 환경에서 변수가중치를 적용한 사례기반추론 기반의 고객반응 예측)

  • Kim, Eunmi;Hong, Taeho
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.29-45
    • /
    • 2015
  • Response modeling is a well-known research issue for those who have tried to get more superior performance in the capability of predicting the customers' response for the marketing promotion. The response model for customers would reduce the marketing cost by identifying prospective customers from very large customer database and predicting the purchasing intention of the selected customers while the promotion which is derived from an undifferentiated marketing strategy results in unnecessary cost. In addition, the big data environment has accelerated developing the response model with data mining techniques such as CBR, neural networks and support vector machines. And CBR is one of the most major tools in business because it is known as simple and robust to apply to the response model. However, CBR is an attractive data mining technique for data mining applications in business even though it hasn't shown high performance compared to other machine learning techniques. Thus many studies have tried to improve CBR and utilized in business data mining with the enhanced algorithms or the support of other techniques such as genetic algorithm, decision tree and AHP (Analytic Process Hierarchy). Ahn and Kim(2008) utilized logit, neural networks, CBR to predict that which customers would purchase the items promoted by marketing department and tried to optimized the number of k for k-nearest neighbor with genetic algorithm for the purpose of improving the performance of the integrated model. Hong and Park(2009) noted that the integrated approach with CBR for logit, neural networks, and Support Vector Machine (SVM) showed more improved prediction ability for response of customers to marketing promotion than each data mining models such as logit, neural networks, and SVM. This paper presented an approach to predict customers' response of marketing promotion with Case Based Reasoning. The proposed model was developed by applying different weights to each feature. We deployed logit model with a database including the promotion and the purchasing data of bath soap. After that, the coefficients were used to give different weights of CBR. We analyzed the performance of proposed weighted CBR based model compared to neural networks and pure CBR based model empirically and found that the proposed weighted CBR based model showed more superior performance than pure CBR model. Imbalanced data is a common problem to build data mining model to classify a class with real data such as bankruptcy prediction, intrusion detection, fraud detection, churn management, and response modeling. Imbalanced data means that the number of instance in one class is remarkably small or large compared to the number of instance in other classes. The classification model such as response modeling has a lot of trouble to recognize the pattern from data through learning because the model tends to ignore a small number of classes while classifying a large number of classes correctly. To resolve the problem caused from imbalanced data distribution, sampling method is one of the most representative approach. The sampling method could be categorized to under sampling and over sampling. However, CBR is not sensitive to data distribution because it doesn't learn from data unlike machine learning algorithm. In this study, we investigated the robustness of our proposed model while changing the ratio of response customers and nonresponse customers to the promotion program because the response customers for the suggested promotion is always a small part of nonresponse customers in the real world. We simulated the proposed model 100 times to validate the robustness with different ratio of response customers to response customers under the imbalanced data distribution. Finally, we found that our proposed CBR based model showed superior performance than compared models under the imbalanced data sets. Our study is expected to improve the performance of response model for the promotion program with CBR under imbalanced data distribution in the real world.

An Ontology-based Generation of Operating Procedures for Boiler Shutdown : Knowledge Representation and Application to Operator Training (온톨로지 기반의 보일러 셧다운 절차 생성 : 지식표현 및 훈련시나리오 활용)

  • Park, Myeongnam;Kim, Tae-Ok;Lee, Bongwoo;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.4
    • /
    • pp.47-61
    • /
    • 2017
  • The preconditions of the usefulness of an operator safety training model in large plants are the versatility and accuracy of operational procedures, obtained by detailed analysis of the various types of risks associated with the operation, and the systematic representation of knowledge. In this study, we consider the artificial intelligence planning method for the generation of operation procedures; classify them into general actions, actions and technical terms of the operator; and take into account the sharing and reuse of knowledge, defining a knowledge expression ontology. In order to expand and extend the general operations of the operation, we apply a Hierarchical Task Network (HTN). Actual boiler plant case studies are classified according to operating conditions, states and operating objectives between the units, and general emergency shutdown procedures are created to confirm the applicability of the proposed method. These results based on systematic knowledge representation can be easily applied to general plant operation procedures and operator safety training scenarios and will be used for automatic generation of safety training scenarios.

A Study on Quantitative Evaluation Method for STT Engine Accuracy based on Korean Characteristics (한국어 특성 기반의 STT 엔진 정확도를 위한 정량적 평가방법 연구)

  • Min, So-Yeon;Lee, Kwang-Hyong;Lee, Dong-Seon;Ryu, Dong-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.699-707
    • /
    • 2020
  • With the development of deep learning technology, voice processing-related technology is applied to various areas, such as STT (Speech To Text), TTS (Text To Speech), ChatBOT, and intelligent personal assistant. In particular, the STT is a voice-based, relevant service that changes human languages to text, so it can be applied to various IT related services. Recently, many places, such as general private enterprises and public institutions, are attempting to introduce the relevant technology. On the other hand, in contrast to the general IT solution that can be evaluated quantitatively, the standard and methods of evaluating the accuracy of the STT engine are ambiguous, and they do not consider the characteristics of the Korean language. Therefore, it is difficult to apply the quantitative evaluation standard. This study aims to provide a guide to an evaluation of the STT engine conversion performance based on the characteristics of the Korean language, so that engine manufacturers can perform the STT conversion based on the characteristics of the Korean language, while the market could perform a more accurate evaluation. In the experiment, a 35% more accurate evaluation could be performed compared to the existing methods.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Types and Functions of English Hedges at a syntax-pragmatics Interface (통사화용의 접합면에서 본 영어 헤지표현의 유형과 기능)

  • Hong, Sungshim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.381-388
    • /
    • 2020
  • This paper discusses English Hedges or Hedging Expressions on the basis of their morphosyntactic-pragramatic properties within the perspective of sociolinguistics. The term, 'Hedges' for the past decades since Lakoff(1973), has received little attention from the English grammar circles such as morphosyntax and the generative grammar theories. This paper presents a more comprehensive approach to the identification, distributions, functions, and the morphosyntactic properties of English Hedges. The earlier research on English Hedges in the 70's show that hedges are metalinguistic or mitadiscourse expressions which constitute a means for executing Politeness strategy in pragmatics. Nonetheless, research from the interface of syntactic-pragmatics has been scarce. This article suggests a more complex body of English hedges that have not been extensively discussed in the literature. Additionally, their configurational domain is to be proposed as part of the PolP with [±hedged] above CP+ (or CP beyond). The ramifications of the current study are suggested in terms of comparative linguistics, EFL/ESL studies of English for global communication, and pragmatics-sensitive machine translation studies in the forseeable future.

Experimental Study on Flow Direction of Fire Smoke in DC Electric Fields (DC 전기장 내에서 발생하는 화재연기 진행 방향에 대한 실험적 연구)

  • Park, Juwon;Kim, Youngmin;Seong, Seung Hun;Park, Sanghwan;Kim, Ji Hwan;Chung, Yongho;Yoon, Sung Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.5
    • /
    • pp.675-682
    • /
    • 2021
  • Fire accidents on land and at sea can cause serious casualties; specifically, owing to the nature of marine plants and ships, the mortality rate at sea from suffocation in confined spaces is significantly higher than that on land. To prevent such cases of asphyxiation, it is essential to install ventilation fans that can outwardly direct these toxic gases from fires; however, considering the scale of marine fires, the installation of large ventilation fans is not easy owing to the nature of marine structures. Therefore, in this study, we developed a new concept for fire safety technology to control toxic gases generated by fires from applied direct current (DC) electric fields. In the event of a fire, most flames contain large numbers of positive and negative charges from chemi-ionization, which generates an "ionic wind" by Lorentz forces through the applied electric fields. Using these ionic winds, an experimental study was performed to artificially control the fire smoke caused by burning paper and styrofoam, which are commonly used as insulation materials in general buildings and ships. The experiments showed that a fire smoke could be artificially controlled by applying a DC voltage in excess of ±5 kV and that relatively effective control was possible by applying a negative voltage rather than a positive voltage.

A Guideline for Identifying Blockchain Applications in Organizations (기업에서 요구되는 블록체인 애플리케이션 탐색을 위한 가이드라인)

  • Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.83-101
    • /
    • 2019
  • Blockchain is considered as an innovative technology along with Artificial Intelligence, Big Data, and Internet of Things. However, since the inception of the genesis of blockchain technology, the cryptocurrency Bitcoin, the technology is not utilized widely, not let alone disruptive applications. Most of the blockchain research deals with the cryptocurrency, general descriptions of the technology such as trend, outlook of the technology, explanation of component technology, and so on. There are no killer applications like Facebook or Google, of course. Reflecting on the slow adoption by businesses, we wanted know about the current status of the research on blockchain in Korea. The main purpose of this paper is to help business practitioners to identify the application of blockchain to enhance the competitiveness of their organization. To do that, we first use the framework by Iansiti et al (2017) and categorize the blockchain related articles published in Korea according to the framework. This is to provide a benchmark or cases of other organizations' adoption of blockchain technology. Second, based on the value proposition of blockchain applications, we suggest evolutionary paths for adopting them. Third, from the demand pull perspective of technology adoption for innovation, we propose applicable areas where blockchain applications can be introduced. Fourth, we use the value chain model to find out the appropriate domains of blockchain applications in the corporate value chains. And the five competitive forces models is adopted to find ways of lowering the power of forces by incorporating blockchain technology.

A Statistical Correction of Point Time Series Data of the NCAM-LAMP Medium-range Prediction System Using Support Vector Machine (서포트 벡터 머신을 이용한 NCAM-LAMP 고해상도 중기예측시스템 지점 시계열 자료의 통계적 보정)

  • Kwon, Su-Young;Lee, Seung-Jae;Kim, Man-Il
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.23 no.4
    • /
    • pp.415-423
    • /
    • 2021
  • Recently, an R-based point time series data validation system has been established for the statistical post processing and improvement of the National Center for AgroMeteorology-Land Atmosphere Modeling Package (NCAM-LAMP) medium-range prediction data. The time series verification system was used to compare the NCAM-LAMP with the AWS observations and GDAPS medium-range prediction model data operated by Korea Meteorological Administration. For this comparison, the model latitude and longitude data closest to the observation station were extracted and a total of nine points were selected. For each point, the characteristics of the model prediction error were obtained by comparing the daily average of the previous prediction data of air temperature, wind speed, and hourly precipitation, and then we tried to improve the next prediction data using Support Vector Machine( SVM) method. For three months from August to October 2017, the SVM method was used to calibrate the predicted time series data for each run. It was found that The SVM-based correction was promising and encouraging for wind speed and precipitation variables than for temperature variable. The correction effect was small in August but considerably increased in September and October. These results indicate that the SVM method can contribute to mitigate the gradual degradation of medium-range predictability as the model boundary data flows into the model interior.

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.