• Title/Summary/Keyword: Artificial intelligence cloud

Search Result 215, Processing Time 0.032 seconds

A Study on the Connective Validity of Technology Maturity and Industry for Core Technologies based on 4th Industrial Revolution (4차 산업혁명 기반 핵심기술에 대한 기술성숙도와 산업과 연계 타당성 연구)

  • Cho, Han-Jin;Jeong, Kyuman
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.49-57
    • /
    • 2019
  • The core technology development of the Fourth Industrial Revolution is linked to the development of other core technologies, which will change the industrial structure in the future and create a new smart business model. In this paper, tried to analyze the technology maturity level and analyze the technology maturity. To do this, used technology trend information to investigate and integrate the market, policy, etc. Of core technology of the 4th Industrial Revolution to achieve a comprehensive maturity level. Because technology maturity measures are scored by technology developers, prejudices may be acted upon according to a person's tendency, which may be a subjective evaluation. It is also a measure of the maturity of individual technologies, and thus is not suitable for evaluating the overall system integration perspective. However, it is possible to evaluate the maturity before integrating the core element technologies constituting the whole system and to use it as a means to compare the effect of the whole system and its feasibility and play an important role in the planning of technology development.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

Automatic Construction of Deep Learning Training Data for High-Definition Road Maps Using Mobile Mapping System (정밀도로지도 제작을 위한 모바일매핑시스템 기반 딥러닝 학습데이터의 자동 구축)

  • Choi, In Ha;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.133-139
    • /
    • 2021
  • Currently, the process of constructing a high-definition road map has a high proportion of manual labor, so there are limitations in construction time and cost. Research to automate map production with high-definition road maps using artificial intelligence is being actively conducted, but since the construction of training data for the map construction is also done manually, there is a need to automatically build training data. Therefore, in this study, after converting to images using point clouds acquired by a mobile mapping system, the road marking areas were extracted through image reclassification and overlap analysis using thresholds. Then, a methodology was proposed to automatically construct training data for deep learning data for the high-definition road map through the classification of the polygon types in the extracted regions. As a result of training 2,764 lane data constructed through the proposed methodology on a deep learning-based PointNet model, the training accuracy was 99.977%, and as a result of predicting the lanes of three color types using the trained model, the accuracy was 99.566%. Therefore, it was found that the methodology proposed in this study can efficiently produce training data for high-definition road maps, and it is believed that the map production process of road markings can also be automated.

An Exploratory Research on the Effects for SMEs of the Technology Battle between the United States and China - A Focus on Information Security Issues of Huawei (미·중 기술 갈등에 따른 우리나라 중소기업의 파급효과에 관한 탐색적 연구 -화웨이 정보보안 이슈를 중심으로 -)

  • Park, Munsu;Son, Wonbae
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.43-56
    • /
    • 2020
  • The technology conflict between the U.S. and China is deepening recently. The U.S.-China battle began as a national security issue but is comprehending as a U.S.'s check for China's rapid technological advancement. China is rapidly growing in several indexes including R&D expenditure, patent application, and publications, and is challenging the U.S. in 5G and Artificial Intelligence. In 2018, Huawei became the largest 5G network/equipment provider and second largest smart phone manufacturer in the world. Now, Huawei is outperforming at AI chipset manufacturing, Bigdata analysis and cloud, positioning to become a critical player in the 4th industrial revolution. The purpose of this research is to analyze the effect of recent Huawei issues to Korean SMEs focusing on the relation between Huawei and Korean companies; the cooperation status from the Global Value Chain (GVC) perpsective, and Korean government's policies related to Huawei's information security issues will be the three main frames for the analysis. Then, this research proposes policy implications such as increasing Korea's competitiveness in manufacturing and information security.

The Design of Digital Human Content Creation System (디지털 휴먼 컨텐츠 생성 시스템의 설계)

  • Lee, Sang-Yoon;Lee, Dae-Sik;You, Young-Mo;Lee, Kye-Hun;You, Hyeon-Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.271-282
    • /
    • 2022
  • In this paper, we propose a digital human content creation system. The digital human content creation system works with 3D AI modeling through whole-body scanning, and is produced with 3D modeling post-processing, texturing, rigging. By combining this with virtual reality(VR) content information, natural motion of the virtual model can be achieved in virtual reality, and digital human content can be efficiently created in one system. Therefore, there is an effect of enabling the creation of virtual reality-based digital human content that minimizes resources. In addition, it is intended to provide an automated pre-processing process that does not require a pre-processing process for 3D modeling and texturing by humans, and to provide a technology for efficiently managing various digital human contents. In particular, since the pre-processing process such as 3D modeling and texturing to construct a virtual model are automatically performed by artificial intelligence, so it has the advantage that rapid and efficient virtual model configuration can be achieved. In addition, it has the advantage of being able to easily organize and manage digital human contents through signature motion.

Introduction to the Technology of Digital Groundwater (Digital Groundwater의 기술 소개)

  • Hyeon-Sik Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.10-10
    • /
    • 2023
  • 본질적으로 복잡하고 다양한 특성을 가지는 우리나라(도시, 농어촌, 도서산간, 섬 등)의 물 공급 시스템은 생활수준의 향상, 기후변화 및 가뭄위기, 소비환경 중심의 요구와 한정된 수자원을 잘 활용하기 위한 운영 및 관리가 매우 복잡하다. 이로 인한 수자원 고갈과 가뭄위기 등에 관련한 대책 및 방안으로 대체수자원인 지하수 활용방안들이 제시되고 있다. 따라서, 물 관리 시스템과 관련한 디지털 기술은 오늘날 플랫폼과 디지털 트윈의 도입을 통해 네트워크와 가상현실 세계의 연결이 통합되어진 4차 산업혁명 사업이 현실화되고 있다. 물 관리 시스템에 사용된 새로운 디지털 기술 "BDA(Big Data Analytics), CPS(Cyber Physical System), IoT(Internet of Things), CC(Cloud Computing), AI(Artificial Intelligence)" 등의 성장이 증가함에 따라 가뭄대응 위기와 도시 지하수 물 순환 시스템 운영이 증가하는 소비자 중심의 수요를 충족시키기 위해서는 지속가능한 지하수 공급을 효과적으로 관리되어야 한다. 4차 산업혁명과 관련한 기술성장이 증가함으로 인한 물 부문은 시스템의 지속가능성을 향상시키기 위해 전체 디지털화 단계로 이동하고 있다. 이러한 디지털 전환의 핵심은 데이터에 관한 것이며, 이를 활용하여 가치 창출을 위해서 "Digital Groundwater Technology/Twin(DGT)"를 극대화하는 방식으로 제고해야 한다. 현재 당면하고 있는 기후위기에 따른 가뭄, 홍수, 녹조, 탁수, 대체수자원 등의 수자원 재해에 대한 다양한 대응 방안과 수자원 확보 기술이 논의되고 있다. 이에 따른 "물 순환 시스템"의 이해와 함께 문제해결 방안도출을 위하여 이번 "기획 세션"에서는 지하수 수량 및 수질, 정수, 모니터링, 모델링, 운영/관리 등의 수자원 데이터의 플랫폼 동시성 구축으로부터 역동적인 "DGT"을 통한 디지털 트윈화하여, 지표수-토양-지하수 분야의 특화된 연직 프로파일링 관측기술을 다각도로 모색하고자 한다. "Digital Groundwater(DG)"는 지하수의 물 순환, 수량 및 수질 관리, 지표수-지하수 순환 및 모니터링, 지하수 예측 모델링 통합연계를 위해 지하수 플랫폼 동시성, ChatGPT, CPS 및 DT 등의 복합 디지털화 단계로 나가고 있다. 복잡한 지하환경의 이해와 관리 및 보존을 위한 지하수 네트워크에서 수량과 수질 데이터를 수집하기 위한 스마트 지하수 관측기술 개발은 큰 도전이다. 스마트 지하수 관측기술은 BD분석, AI 및 클라우드 컴퓨팅 등의 디지털 기술에 필요한 획득된 데이터 분석에 사용되는 알고리즘의 복잡성과 데이터 품질에 따라 영향을 미칠 수 있기 때문이다. "DG"는 지하수의 정보화 및 네트워크 운영관리 자동화, 지능화 등을 위한 디지털 도구를 활용함으로써 지표수-토양층-지하수 네트워크 통합관리에 대한 비전을 만들 수 있다. 또한, DGT는 지하수 관측센서의 1차원 데이터 융합을 이용한 지하수 플랫폼 동시성과 디지털 트윈을 연계할 수 있다.

  • PDF

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Telemedicine Protocols for the Management of Patients with Acute Spontaneous Intracerebral Hemorrhage in Rural and Medically Underserved Areas in Gangwon State : Recommendations for Doctors with Less Expertise at Local Emergency Rooms

  • Hyo Sub Jun;Kuhyun Yang;Jongyeon Kim;Jin Pyeong Jeon;Sun Jeong Kim;Jun Hyong Ahn;Seung Jin Lee;Hyuk Jai Choi;In Bok Chang;Jeong Jin Park;Jong-Kook Rhim;Sung-Chul Jin;Sung Min Cho;Sung-Pil Joo;Seung Hun Sheen;Sang Hyung Lee
    • Journal of Korean Neurosurgical Society
    • /
    • v.67 no.4
    • /
    • pp.385-396
    • /
    • 2024
  • Previously, we reported the concept of a cloud-based telemedicine platform for patients with intracerebral hemorrhage (ICH) at local emergency rooms in rural and medically underserved areas in Gangwon state by combining artificial intelligence and remote consultation with a neurosurgeon. Developing a telemedicine ICH treatment protocol exclusively for doctors with less ICH expertise working in emergency rooms should be part of establishing this system. Difficulties arise in providing appropriate early treatment for ICH in rural and underserved areas before the patient is transferred to a nearby hub hospital with stroke specialists. This has been an unmet medical need for decades. The available reporting ICH guidelines are realistically applicable in university hospitals with a well-equipped infrastructure. However, it is very difficult for doctors inexperienced with ICH treatment to appropriately select and deliver ICH treatment based on the guidelines. To address these issues, we developed an ICH telemedicine protocol. Neurosurgeons from four university hospitals in Gangwon state first wrote the guidelines, and professors with extensive ICH expertise across the country revised them. Guidelines and recommendations for ICH management were described as simply as possible to allow more doctors to use them easily. We hope that our effort in developing the telemedicine protocols will ultimately improve the quality of ICH treatment in local emergency rooms in rural and underserved areas in Gangwon state.