• Title/Summary/Keyword: Industrial Security Theory

Search Result 44, Processing Time 0.023 seconds

Consciousness, Cognition and Neural Networks in the Brain: Advances and Perspectives in Neuroscience

  • Muhammad Saleem;Muhammad Hamid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.47-54
    • /
    • 2023
  • This article reviews recent advances and perspectives in neuroscience related to consciousness, cognition, and neural networks in the brain. The neural mechanisms underlying cognitive processes, such as perception, attention, memory, and decision-making, are explored. The article also examines how these processes give rise to our experience of consciousness. The implications of these findings for our understanding of the brain and its functions are presented, as well as potential applications of this knowledge in fields such as medicine, psychology, and artificial intelligence. Additionally, the article explores the concept of a quantum viewpoint concerning consciousness, cognition, and creativity and how incorporating DNA as a key element could reconcile classical and quantum perspectives on human behaviour, consciousness, and cognition, as explained by genomic psychological theory. Furthermore, the article explains how the human brain processes external stimuli through the sensory nervous system and how it can be simulated using an artificial neural network (ANN) consisting of one input layer, multiple hidden layers, and an output layer. The law of learning is also discussed, explaining how ANNs work and how the modification of weight values affects the output and input values. The article concludes with a discussion of future research directions in this field, highlighting the potential for further discoveries and advancements in our understanding of the brain and its functions.

Classification of Objects using CNN-Based Vision and Lidar Fusion in Autonomous Vehicle Environment

  • G.komali ;A.Sri Nagesh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.67-72
    • /
    • 2023
  • In the past decade, Autonomous Vehicle Systems (AVS) have advanced at an exponential rate, particularly due to improvements in artificial intelligence, which have had a significant impact on social as well as road safety and the future of transportation systems. The fusion of light detection and ranging (LiDAR) and camera data in real-time is known to be a crucial process in many applications, such as in autonomous driving, industrial automation and robotics. Especially in the case of autonomous vehicles, the efficient fusion of data from these two types of sensors is important to enabling the depth of objects as well as the classification of objects at short and long distances. This paper presents classification of objects using CNN based vision and Light Detection and Ranging (LIDAR) fusion in autonomous vehicles in the environment. This method is based on convolutional neural network (CNN) and image up sampling theory. By creating a point cloud of LIDAR data up sampling and converting into pixel-level depth information, depth information is connected with Red Green Blue data and fed into a deep CNN. The proposed method can obtain informative feature representation for object classification in autonomous vehicle environment using the integrated vision and LIDAR data. This method is adopted to guarantee both object classification accuracy and minimal loss. Experimental results show the effectiveness and efficiency of presented approach for objects classification.

The Effect of Airport Security Screeners' New Technology Acceptance to the Innovation and Job Satisfaction of Airport Security (공항보안검색요원의 신기술 수용성이 공항보안업무의 직무만족도와 업무혁신성에 미치는 영향)

  • Jeon, Jong-Duk;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.394-403
    • /
    • 2019
  • This research focuses on the perception of security screeners using a full body scanner at airport which had been newly introduced to terminal 2 of Incheon Int'l airport. To accomplish the purpose of research, this paper used UTAUT (Unified Theory of Acceptance and Use of Technology) model. Through an empirical analysis, it was proven the factors consisting of technological acceptance and how those factors affect both organizational innovation at airport and job satisfaction of security screeners. According to an empirical analysis, it was found out all the factors of technological acceptance have a significant effect on both organizational innovation and job satisfaction. However, only the effort expectation was shown to have a significant negative effect on the two dependant variables contrary to the other variables (performance expectation, behavioral intention and self efficacy. It was also proven organizational innovation had a moderating effect between technological acceptance and job satisfaction. Such results suggested organizational innovation at airport security division is necessary to enhance job satisfaction using a newly introduced full body scanner.

A Decision-making Model for Selection of Blockchain as a Service (BaaS(Blockchain as a Service) 선정을 위한 의사결정 모델)

  • Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.1
    • /
    • pp.7-11
    • /
    • 2024
  • In the era of the 4th Industrial Revolution, new technologies such as artificial intelligence, big data, cloud, Internet of Things, and blockchain are being developed and applied to new industries. Blockchain has the characteristics of decentralization, security, and transparency, so it can serve as a core technology for developing new growth industries. Blockchain is provided as BaaS (Blockchain as a Service), but it is not easy for users who are introducing or building blockchain to choose BaaS. In this study, we identify evaluation factors and develop a decision-making model using fuzzy theory and AHP for BaaS selection. Eventually we aim to help companies choose the best BaaS and develop and commercialize blockchain-based services by developing a new decision-making model for BaaS selection.

  • PDF

A Evaluation of Strategic Informed Trader Model with Broker (브로커가 존재하는 전략적 정보거래모형의 평가)

  • Kim, Sung-Tak
    • Korean Business Review
    • /
    • v.12
    • /
    • pp.103-118
    • /
    • 1999
  • Many security companies in Korea play the same role as the broker who can do dual trading in the American securities market. It seems that the proper model for the Korean market microstructure should contain the existence of broker. But the broker occupied little attention in U.S. until the early 1990. The purpose of this paper is to review and evaluate the strategic trader models of market microstructure theory which contain the broker as player. Three major models, Sarkar(1995), Chakravarty(1994), Chun, Oh, and Weller(1996) were compared and evaluated critically in the context of the Korean security market microstructure. The model of Sarkar(1995) was evaluated to be more appropriate for the Korean securities market context. Finally, limitations of this paper were indicated and some directions for the further research were suggested.

  • PDF

Information Technologies in the Formation of Environmental Consciousness in Future Professionals

  • Tomchuk, Mykhailo;Khrolenko, Maryna;Volokhata, Kateryna;Bakka, Yuliia;Ieresko, Oleg;Kambalova, Yanina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.331-339
    • /
    • 2022
  • The global process of transition from industrial to information society, as well as socio-economic changes taking place in Ukraine, require significant changes in many areas of state activity. It is especially connected with the reforms in the sphere of education. Today, national programs provide for the development of education on the basis of new progressive concepts, the introduction of the educational process of new pedagogical technologies and scientific achievements, the creation of a new system of information education, entrance of Ukaine into the transcontinental computer information system. Information technologies are qualitatively changing the key resources of development: this is no longer a space with fixed production, but primarily mobile finance and intelligence. They have a direct impact on the formation of personal growth, professional content and self-organization, emotional and psychological maturity and consciousness, and so on. One of the main factors in ensuring the stability and social education of the country's citizens is the culture of security, the formation and development of which is an urgent problem today. Comprehensive and systematic development of security culture will significantly increase the readiness of the population, the level of environmental, labor and patriotic education, reduce human losses, material damage from emergencies. Ecological education can be carried out more successfully only gradually and in accordance with the socio-psychological periods of one's development: kindergarten - school - college - university. The creation of such a system of environmental education should be enshrined as the basis of state environmental policy as a constitutional norm with the usage of information technology. Graduates of universities, who are the future of our country, after mastering the skills of basic environmental education must have a high level of environmental culture, which is, in turn, part of general human culture, and investigate environmental issues from the standpoint of their profession. It is known that with the help of environmental education the collective intelligence of society is formed, which can predict human activities and processes occurring in nature, and in some way to help with the elimination of crises. It is through environmental education that another system of human values is being formed, which places great emphasis on intangible wealth and solidarity, and great responsibility of humanity for the ecological state of the native country; provides a higher standard of living as a result of sustainable development, through the introduction of information technology in this system. To improve the quality of life, we need better knowledge, which must be implemented through information technology at the international level.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

A Study on the Online Perception of Chabak Using Big Data Analysis (빅데이터 분석을 통한 차박의 온라인 인식에 대한 연구)

  • Kim, Sae-Hoon;Lee, Hwan-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.61-81
    • /
    • 2021
  • In the era of untact, the "Chabak" using cars as accommodation spaces is attracting attention as a new form of travel. Due to the advantages, including low costs, convenience, and safety, as well as the characteristics of the vehicle enabling independent travel, the demand for Chabak is continuously increasing. Despite the rapid growth of the market and related industries, little academic has investigated this trend. To establish itself as a new type of travel culture and to sustain the growth of related industries, it is essential to understand the public perception of Chabak. Therefore, based on the marketing mix theory and big data analysis, this study analyzes the public perception of Chabak. The results showed that Chabak has established itself as a consumer-led travel culture, contributing to the aftermarket growth of the automobile industry. Additionally, consumers were found to be increasingly inclined to enjoy travel economically and wisely, and actively share information through social media. This initial study on the new travel trend of Chabak is significant in that it employs big data analysis on a theoretical basis.

A Study of Incentive Problems of Welfare State (복지국가의 인센티브 문제에 관한 연구)

  • Cheon, Byung You
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.69-96
    • /
    • 2013
  • This paper is to critically review the economic reasoning of non-sustainability of welfare state due to its intrinsic incentive problems and to see how the nordic welfare state responds to them. The welfare state as a political design of state to pursue equality has social insurance as its main economic function. It survives market failure of private insurance to contribute to human capital investment and industrial restructuring. The universal tax-financed welfare state, however, has the problem of tragedy of commons such as reduced work incentive and work ethics. But, the existing nordic welfare state overcomes it through employment-focused policy arrangements, maintenance of work ethics and benefits moral, incentive mechanism of wage-compression, public educational investment and its complementation with social security. The Nordic model shows that problems of incentive and moral are not about those of theory and reasoning, but about their reality which policies and institutions could respond to.

A Study on the Crime Prevention Design and Consumer Perception (CPTED) of Multi-Family Housing in China (중국 공동주택의 범죄 예방을 위한 디자인과 소비자의 인식에 관한 연구)

  • Kong, De Xin;Lee, Dong Hun;Park, Hae Rim
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.63-76
    • /
    • 2024
  • Multi-family housing plays a crucial role as a living and experiencing space, and its environment has a direct impact on the well-being and stability of its residents. Therefore, Crime Prevention Design (CPTED) for multi-family housing is of utmost importance. However, crime-related data in China is not disclosed to the public because of its specificity, making it difficult for researchers to conduct further in-depth studies based on accurate crime data. As a result, the establishment and application of CPTED theory in terms of crime prevention is limited and delayed. This study aims to explore three aspects of CPTED in multi-family housing as perceived by home-buying consumers. It investigated consumer perception of the CPTED, the importance of each element and ways to increase awareness of CPTED in multifamily housing in order to effectively improve multifamily crime prevention design principles and further enhance public safety. This study examined the current state and future trends of CPTED in China by analyzing relevant research reports and literature, aiming to gain insights into the crime prevention awareness of Chinese homeowners. In addition, a survey was conducted on Chinese consumers to unravel the importance of CPTED and increase awareness of its various elements in multifamily-family. This study used a Likert scale and SPSS reliability analysis to determine the cognitive status of multi-family CPTED, the importance of each element, and proposed an improvement plan based on the analysis results. As this study was limited by the difficulty of implementation and the lack of validation of its practical effectiveness, it is recommended that future research needs to validate the effectiveness of crime prevention designs and produce more practical results. Furthermore, it is crucial to utilize this study to inform the implementation of security solutions that are tailored to the unique characteristics of each district. Additionally, it is important to offer guidance on how to enhance community safety by increasing residents' awareness of security through education and information dissemination. The author hopes that the representative multi-family CPTED awareness, the importance of each element, and plans for improvement shall be summarized from this study, and provide foundational data for the future development of CPTED based on the Chinese region.