• Title/Summary/Keyword: Application Services

Search Result 3,791, Processing Time 0.026 seconds

A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone (객체인식 AI적용 드론에 대응할 수 있는 적대적 예제 기반 소극방공 기법 연구)

  • Simun Yuk;Hweerang Park;Taisuk Suh;Youngho Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.119-125
    • /
    • 2023
  • Through the Ukraine-Russia war, the military importance of drones is being reassessed, and North Korea has completed actual verification through a drone provocation towards South Korea at 2022. Furthermore, North Korea is actively integrating artificial intelligence (AI) technology into drones, highlighting the increasing threat posed by drones. In response, the Republic of Korea military has established Drone Operations Command(DOC) and implemented various drone defense systems. However, there is a concern that the efforts to enhance capabilities are disproportionately focused on striking systems, making it challenging to effectively counter swarm drone attacks. Particularly, Air Force bases located adjacent to urban areas face significant limitations in the use of traditional air defense weapons due to concerns about civilian casualties. Therefore, this study proposes a new passive air defense method that aims at disrupting the object detection capabilities of AI models to enhance the survivability of friendly aircraft against the threat posed by AI based swarm drones. Using laser-based adversarial examples, the study seeks to degrade the recognition accuracy of object recognition AI installed on enemy drones. Experimental results using synthetic images and precision-reduced models confirmed that the proposed method decreased the recognition accuracy of object recognition AI, which was initially approximately 95%, to around 0-15% after the application of the proposed method, thereby validating the effectiveness of the proposed method.

A Study on the Selection of Hydrogen Refueling Station Locations within Military Bases Considering Minimum Safe Distances between Adjacent Buildings (인접 건물 간 최소 안전거리를 고려한 군부대 내 수소충전소 위치선정 연구)

  • Dong-Yeon Kim;Hyuk-Jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.171-180
    • /
    • 2023
  • Hydrogen energy technology is gaining importance in the era of the Fourth Industrial Revolution, offering military advantages when applied to military vehicles due to its characteristics such as reduced greenhouse gas emissions, noise, and low vibration. Korea's military has initiated the Army Tiger 4.0 plan, focusing on hydrogen application, downsizing, and AI-based smart features. The Ministry of National Defense plans to collaborate with the Ministry of Environment to expand hydrogen charging stations nationwide, anticipating increased deployment of military hydrogen vehicles. However, considering the Jet Fire and VCE(Vapor Cloud Explosion) nature of hydrogen, ensuring safety during installation is crucial. Current military guidelines specify a minimum safety distance of 2m from adjacent buildings for charging stations. Scientific methods have been employed to quantitatively assess the accident damage range of hydrogen, proposing a minimum safety distance beyond the affected area.

Analysis of Changes in Restaurant Attributes According to the Spread of Infectious Diseases: Application of Text Mining Techniques (감염병 확산에 따른 레스토랑 선택속성 변화 분석: 텍스트마이닝 기법 적용)

  • Joonil Yoo;Eunji Lee;Chulmo Koo
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.89-112
    • /
    • 2023
  • In March 2020, as it was declared a COVID-19 pandemic, various quarantine measures were taken. Accordingly, many changes have occurred in the tourism and hospitality industries. In particular, quarantine guidelines, such as the introduction of non-face-to-face services and social distancing, were implemented in the restaurant industry. For decades, research on restaurant attributes has emphasized the importance of three attributes: atmosphere, service quality, and food quality. Nevertheless, to the best of our knowledge, research on restaurant attributes considering the COVID-19 situation is insufficient. To respond to this call, this study attempted an exploratory approach to classify new restaurant attributes based on understanding environmental changes. This study considered 31,115 online reviews registered in Naverplace as an analysis unit, with 475 general restaurants located in Euljiro, Seoul. Further, we attempted to classify restaurant attributes by clustering words within online reviews through TF-IDF and LDA topic modeling techniques. As a result of the analysis, the factors of "prevention of infectious diseases" were derived as new attributes of restaurants in the context of COVID-19 situations, along with the atmosphere, service quality, and food quality. This study is of academic significance by expanding the literature of existing restaurant attributes in that it categorized the three attributes presented by existing restaurant attributes and further presented new attributes. Moreover, the analysis results have led to the formulation of practical recommendations, considering both the operational aspects of restaurants and policy implications.

A Study on Efficient AI Model Drift Detection Methods for MLOps (MLOps를 위한 효율적인 AI 모델 드리프트 탐지방안 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.17-27
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology develops and its practicality increases, it is widely used in various application fields in real life. At this time, the AI model is basically learned based on various statistical properties of the learning data and then distributed to the system, but unexpected changes in the data in a rapidly changing data situation cause a decrease in the model's performance. In particular, as it becomes important to find drift signals of deployed models in order to respond to new and unknown attacks that are constantly created in the security field, the need for lifecycle management of the entire model is gradually emerging. In general, it can be detected through performance changes in the model's accuracy and error rate (loss), but there are limitations in the usage environment in that an actual label for the model prediction result is required, and the detection of the point where the actual drift occurs is uncertain. there is. This is because the model's error rate is greatly influenced by various external environmental factors, model selection and parameter settings, and new input data, so it is necessary to precisely determine when actual drift in the data occurs based only on the corresponding value. There are limits to this. Therefore, this paper proposes a method to detect when actual drift occurs through an Anomaly analysis technique based on XAI (eXplainable Artificial Intelligence). As a result of testing a classification model that detects DGA (Domain Generation Algorithm), anomaly scores were extracted through the SHAP(Shapley Additive exPlanations) Value of the data after distribution, and as a result, it was confirmed that efficient drift point detection was possible.

Development of a Real-time Action Recognition-Based Child Behavior Analysis Service System (실시간 행동인식 기반 아동 행동분석 서비스 시스템 개발)

  • Chimin Oh;Seonwoo Kim;Jeongmin Park;Injang Jo;Jaein Kim;Chilwoo Lee
    • Smart Media Journal
    • /
    • v.13 no.2
    • /
    • pp.68-84
    • /
    • 2024
  • This paper describes the development of a system and algorithms for high-quality welfare services by recognizing behavior development indicators (activity, sociability, danger) in children aged 0 to 2 years old using action recognition technology. Action recognition targeted 11 behaviors from lying down in 0-year-olds to jumping in 2-year-olds, using data directly obtained from actual videos provided for research purposes by three nurseries in the Gwangju and Jeonnam regions. A dataset of 1,867 actions from 425 clip videos was built for these 11 behaviors, achieving an average recognition accuracy of 97.4%. Additionally, for real-world application, the Edge Video Analyzer (EVA), a behavior analysis device, was developed and implemented with a region-specific random frame selection-based PoseC3D algorithm, capable of recognizing actions in real-time for up to 30 people in four-channel videos. The developed system was installed in three nurseries, tested by ten childcare teachers over a month, and evaluated through surveys, resulting in a perceived accuracy of 91 points and a service satisfaction score of 94 points.

A Study on intent to use AI-enhanced development tools (AI 증강 개발 도구 사용의도에 관한 연구)

  • Hyun Ji Eun;Lee Seung Hwan;Gim Gwang Yong
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.89-104
    • /
    • 2024
  • This study is an empirical study to examine the factors that influence the intention to use artificial intelligence (AI) technology for SW engineering-related tasks, and the purpose of the study is to understand the key factors that influence the use in terms of AI augmentation characteristics and interactive UI/UX characteristics. For this purpose, a survey was conducted among information and communication workers who have experience in using AI-related technologies and the collected data was analyzed. The results of the empirical analysis showed that perceived usefulness was positively influenced by the factors of expertise, interestingness, realism, aesthetics, efficiency, and flexibility, and perceived ease of use was positively influenced by the factors of expertise, interestingness, realism, aesthetics, and flexibility. Variety had no effect on both perceived ease of use and perceived usefulness. Perceived ease of use had a significant effect on perceived immersion, which positively influenced intention to use. These findings are significant in that they provide an academic understanding of the factors that influence the use of AI-enhanced tools in SW engineering-related tasks such as application design, development, testing, and process automation, as well as practical directions for the creators of tools that provide AI-enhanced development services to develop user acquisition strategies.

Analysis of perceptions and needs of generative AI for work-related use in elementary and secondary education

  • Hye Jin Yun;Kwihoon Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.231-243
    • /
    • 2024
  • As generative artificial intelligence (AI) services become more diversified and widely used, attempts and discussions on their application in education have become active. The purpose of this study is to investigate and analyze general and work-related perceptions, utilization, and needs regarding generative AI in elementary and secondary education. A survey was conducted among teachers and staff in Chungcheongbuk-do, and 934 responses were analyzed. The main research results are as follows: First, their work-related use of generative AI was lower than their general use, and considering the periodic frequency of more than once a month, the rate was much lower. Second, the main expectation when using generative AI in work appears to be improved work efficiency. Third, regarding the use of generative AI for each task, differences in perception of its usefulness were noticeable depending on position and occupation. They generally responded positively to the usefulness of generative AI in processing documents. To facilitate the use of generative AI for work by elementary and secondary teachers and staff, it is necessary to create an environment that promotes its use while ensuring safety against potential side effects. Additionally, requirements and needs should be considered depending on the position and occupation.

Field Perception Analysis on Policy Outcomes of Academic Libraries (국내 대학도서관 정책 성과에 대한 현장 인식 조사)

  • Jongwook Lee;Woojin Kang;Youngmi Jung
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.4
    • /
    • pp.415-436
    • /
    • 2023
  • In this study, we aimed to examine the level of implementation of the second comprehensive plan for promoting academic libraries (2019-2023) by analyzing key statistics of academic libraries and gathering perceptions from library staff. We analyzed the changes in major statistical indicators of libraries over the past five years. Additionally, we surveyed library staff to understand their overall perceptions of the plan and their attitudes towards the 17 sub-tasks outlined in it. The analysis of 369 survey responses revealed several key findings. Firstly, most respondents comprehended the plan well and frequently utilized it for developing their libraries' development and implementation plans. Secondly, the IPA results indicated that regardless of the type of university, there should be a continuous focus on facility improvement, teaching-learning support, and expanding access to academic resources. Efforts to develop library policies and strengthen human and financial resources were identified as crucial. Thirdly, four-year universities particularly emphasized the importance of expanding access to international academic resources compared to junior colleges. Conversely, junior colleges perceived foundational skill-building programs and inclusive services as more significant than four-year universities. The application of the IPA diagonal model revealed that the performance levels of all sub-tasks were lower than their perceived importance levels, suggesting the need for strategies to enhance effectiveness in future comprehensive plan formulation.

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.