• Title/Summary/Keyword: 지속가능지능

Search Result 233, Processing Time 0.027 seconds

Big Data Activation Plan for Digital Transformation of Agriculture and Rural (농업·농촌 디지털 전환을 위한 빅데이터 활성화 방안 연구)

  • Lee, Won Suk;Son, Kyungja;Jun, Daeho;Shin, Yongtae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.8
    • /
    • pp.235-242
    • /
    • 2020
  • In order to promote digital transformation of our agricultural and rural communities in the wake of the fourth industrial revolution and prepare for the upcoming artificial intelligence era, it is necessary to establish a system and system that can collect, analyze and utilize necessary quality data. To this end, we will investigate and analyze problems and issues felt by various stakeholders such as farmers and agricultural officials, and present strategic measures to revitalize big data, which must be decided in order to promote digital transformation of our agricultural and rural communities, such as expanding big data platforms for joint utilization, establishing sustainable big data governance, and revitalizing the foundation for big data utilization based on demand.

Intelligent Video Surveillance System for Video Analysis, Recognition and Tracking (비디오 영상분석, 인식 및 추적을 위한 지능형 비디오 감시시스템)

  • Kim, Tae-Kyung;Paik, Joon-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.498-500
    • /
    • 2012
  • 비디오 해석 및 추적기술은 특정한 시스템에서만 적용되는 것이 아니다. 이것은 비디오 내에서 의미 있는 정보를 능동적으로 감시 대상을 정의, 해석, 모델화, 추정 및 추적 할 수 있는 기반 기술을 의미하다. 일반적으로 감시시스템에서 감시 대상은 사람이나 차량이며, 상황에 따라 출입통제 구역으로 설정하기도 한다. 이는 연속된 영상에서 객체의 형태, 모양, 행동 분석, 움직임, 색상정보를 가지고 데이터 정의, 검출, 모델화를 통하여 인식, 식별 그리고 추적한다. 본 논문에서는 비디오 영상분석을 통해 단일카메라기반의 감시시스템과 PTZ 카메라기반 감시시스템 제안한다. 이때 단일 카메라기반의 감시는 배경생성방법을 이용하여 연속된 영상내의 객체를 지속적으로 관리가 가능하도록 설계하였고, PTZ 카메라기반의 감시는 카메라의 이동에 따른 배경안정화 방법과 카메라의 절대좌표를 활용하여 카메라 이동을 제어함과 동시에 오검출 문제를 해결하였다. 실험 및 결과분석으로는 시나리오 환경에서 배경생성방법을 이용한 검출의 정확성과 PTZ카메라 위치 변화에도 강인한 검출 결과를 비교 분석하였다.

BSM framework using Event-Sourcing and CQRS pattern in V2X environment

  • Han, Sangkon;Goo, EunHee;Choi, Jung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.169-176
    • /
    • 2022
  • With the continuous development of technologies related to 5G, artificial intelligence, and autonomous vehicle systems, standards and services for V2X and C-ITS environments are being studied a lot. BSM (basic safety message) was adopted as a standard for exchanging data between vehicles based on data collected and generated by vehicle systems in a V2V environment. In this paper, we propose a framework that can safely store BSM messages and effectively check the stored messages using Event-Sourcing and CQRS patterns. The proposed framework can securely store and manage BSM messages using hash functions. And it has the advantage of being able to check the stored BSM data in real time based on the time series and to reproduce the state.

Development of Eco driving Simulator Module for Economical Driving (경제적 주행을 위한 친환경 주행 시뮬레이터 모듈 개발)

  • Chung, Sung-Hak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.151-160
    • /
    • 2009
  • The aim of this study is to propose economical driving speed index which those are geometric road status; assess the levels of which those cost-benefit of driving energy consumption and emission; are search road safety design and operational technology for driving simulator. For the objective, we analyzed the current status of driving energy consumption and driving scenarios by the road alignments, and reviewed driving and technical specifications by the geometric types of road according to the implementation, and extended completion. Throughout the result of this study, diverse related driving information provision service, efficiently navigation driving module is expected to be implemented in the national highway design system.

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

Hacking Mail Profiling by Applying Case Based Reasoning (사례기반추론기법을 적용한 해킹메일 프로파일링)

  • Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.107-122
    • /
    • 2015
  • Many defensive mechanisms have been evolved as new attack methods are developed. However, APT attacks using e-mail are still hard to detect and prevent. Recently, many organizations in the government sector or private sector have been hacked by malicious e-mail based APT attacks. In this paper, first, we built hacking e-mail database based on the real e-mail data which were used in attacks on the Korean government organizations in recent years. Then, we extracted features from the hacking e-mails for profiling them. We design a case vector that can describe the specific characteristics of hacking e-mails well. Finally, based on case based reasoning, we made an algorithm for retrieving the most similar case from the hacking e-mail database when a new hacking e-mail is found. As a result, hacking e-mails have common characteristics in several features such as geo-location information, and these features can be used for classifying benign e-mails and malicious e-mails. Furthermore, this proposed case based reasoning algorithm can be useful for making a decision to analyze suspicious e-mails.

SNA Pattern Analysis on the Public Software Industry based on Open API Big Data from Korea Public Procurement Service (조달청 OPEN API 빅데이터를 활용한 공공 소프트웨어 산업의 SNA 패턴 분석)

  • KIM, Sojung lucia;Shim, Seon-Young;Seo, Yong-Won
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.42-66
    • /
    • 2017
  • This study investigated the ecological change of public software industry, comparing the pre and post structure of industry network based on the application of the regulation restricting large company participation in public software market. For this purpose, we used big data of the software market from Korea Public Procurement Service and used the SNA(Social Network Analysis) methodology which is being actively used in the area of social science recently. Finally, we highlighted the contribution of open public data. By analyzing order and contract data of the public software industry for 3 years - from 2013 to 2015 - we found out two main things. First, we observed that Power Law distribution had been going on in the public software industry, regardless of the external impact of regulation. Second, despite the existence of such Power Law distribution, we also observed the ecological change of industry structure from year to year. We presented the implication of such findings and discussed the advantage of open public data as the original motivator of this study.

How do people verify identity in the Metaverse: Through exploring the user's avatar (메타버스 내 아바타 정체성 확인에 영향을 미치는 요인에 관한 연구)

  • Kihyun Kim;Seongwon Lee;Kil-Soo Suh
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.189-217
    • /
    • 2023
  • The metaverse is a virtual world where individuals engage in social, economic, and cultural activities using avatars, which represent an alternate version of oneself within the virtual realm. While the metaverse has garnered global attention recently, research exploring the identity manifested through avatars within the metaverse remains limited. This study investigates the influence of four IT artifact characteristics related to avatar usage in the metaverse-avatar representation, avatar copresence, avatar profiling, and avatar-space interaction-on perceived avatar identity verification. A survey was conducted with 196 experienced users of the Zepeto platform, and hypotheses were tested using structural equation modeling. The analysis results indicate that the use of IT artifacts enabling avatar representation, avatar copresence, and avatar-space interaction has a positive impact on perceived avatar identity verification. This achieved self-verification indirectly influences the satisfaction and subsequent intention to continue using the metaverse. This study contributes to the academic field by empirically verifying the metaverse technological factors that influence the projected identity onto avatars within the metaverse. Furthermore, it is expected to provide effective guidelines for metaverse platform companies in designing and implementing the metaverse.

The Effect of Relationship Building through SNS on an Individual's Intention to Share Information (SNS에서의 관계형성 정도와 개인의 정보공유 태도가 정보공유 의도에 미치는 영향)

  • Kim, Jongki;Kim, Jinsung
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.57-84
    • /
    • 2012
  • If we observe the formation of communities of people and participation methods within them, we can see that those communities are developing more efficiently due to the penetration of smart phones and the growth of SNS. This trend also has an impact on information sharing activity between people and enables more active information sharing than ever before. But information sharing on SNS does not just involve the SNS users sharing information with each other. Important factors affecting the information sharing activities include the type of relationship between the users and the attitude of the information sharing individuals. Accordingly, this study selected perceived social support, perceived social influence, and perceived network structure as the factors that affect the continuous intention of people to use SNS, and performed a higher order factor analysis on those factors. Between continuous intention to use SNS and intention to share information, we selected relationship quality and information sharing behavior and executed a path analysis between the factors. We carried out an empirical analysis by utilizing SPSS 18.0 and SmartPLS 2.0 as analysis tools. Using these tools, we investigated the factors influencing continuous intention to use SNS, and tested the significance between the role and path of relationship quality and information sharing behavior between continuous intention to use SNS and intention to share information.

  • PDF