• Title/Summary/Keyword: Intelligence Government

Search Result 365, Processing Time 0.028 seconds

A Review on Deep Learning Platform for Artificial Intelligence (인공지능 딥러링 학습 플랫폼에 관한 선행연구 고찰)

  • Jin, Chan-Yong;Shin, Seong-Yoon;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.169-170
    • /
    • 2019
  • Lately, as artificial intelligence becomes a source of global competitiveness, the government is strategically fostering artificial intelligence that is the base technology of future new industries such as autonomous vehicles, drones, and robots. Domestic artificial intelligence research and services have been launched mainly in Naver and Kakao, but their size and level are weak compared to overseas. Recently, deep learning has been conducted in recent years while recording innovative performance in various pattern recognition fields including speech recognition and image recognition. In addition, deep running has attracted great interest from industry since its inception, and global information technology companies such as Google, Microsoft, and Samsung have successfully applied deep learning technology to commercial products and are continuing research and development. Therefore, we will look at artificial intelligence which is attracting attention based on previous research.

  • PDF

A Study on the Intention to use the Artificial Intelligence-based Drug Discovery and Development System using TOE Framework and Value-based Adoption Model (TOE 프레임워크와 가치기반수용모형 기반의 인공지능 신약개발 시스템 활용의도에 관한 실증 연구)

  • Kim, Yeongdae;Lee, Won Suk;Jang, Sang-hyun;Shin, Yongtae
    • Journal of Information Technology Services
    • /
    • v.20 no.3
    • /
    • pp.41-56
    • /
    • 2021
  • New drug discovery and development research enable clinical treatment that saves human life and improves the quality of life, but the possibility of success with new drugs is significantly low despite a long time of 14 to 16 years and a large investment of 2 to 3 trillion won in traditional methods. As artificial intelligence is expected to radically change the new drug development paradigm, artificial intelligence new drug discovery and development projects are underway in various forms of collaboration, such as joint research between global pharmaceutical companies and IT companies, and government-private consortiums. This study uses the TOE framework and the Value-based Adoption Model, and the technical, organizational, and environmental factors that should be considered for the acceptance of AI technology at the level of the new drug research organization are the value of artificial intelligence technology. By analyzing the explanatory power of the relationship between perception and intention to use, it is intended to derive practical implications. Therefore, in this work, we present a research model in which technical, organizational, and environmental factors affecting the introduction of artificial intelligence technologies are mediated by strategic value recognition that takes into account all factors of benefit and sacrifice. Empirical analysis shows that usefulness, technicality, and innovativeness have significantly affected the perceived value of AI drug development systems, and that social influence and technology support infrastructure have significant impact on AI Drug Discovery and Development systems.

Efficiency Analysis of Integrated Defense System Using Artificial Intelligence (인공지능을 활용한 통합방위체계의 효율성 분석)

  • Yoo Byung Duk;Shin Jin
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.147-159
    • /
    • 2023
  • Recently, Chat GPT artificial intelligence (AI) is of keen interest to all governments, companies, and military sectors around the world. In the existing era of literacy AI, it has entered an era in which communication with humans is possible with generative AI that creates words, writings, and pictures. Due to the complexity of the current laws and ordinances issued during the recent national crisis in Korea and the ambiguity of the timing of application of laws and ordinances, the golden time of situational measures was often missed. For these reasons, it was not able to respond properly to every major disaster and military conflict with North Korea. Therefore, the purpose of this study was to revise the National Crisis Management Basic Act, which can act as a national tower in the event of a national crisis, and to promote artificial intelligence governance by linking artificial intelligence technology with the civil, government, military, and police.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

Research on the Methodology for Policy Deriving to active Artificial Intelligence (인공지능 활성화 정책 도출 방법 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.187-193
    • /
    • 2020
  • The purpose of this study is to study the methodology of deriving a policy that activates artificial intelligence from the governmental perspective in order to induce corporate growth by effectively grafting artificial intelligence technology into society and thereby improve individual and national competitiveness by creating new jobs. In order to derive activation plans, 1) detailed investigation of the domestic environment, 2) discovery of priority support fields and models that can be applied to artificial intelligence, 3) preparation of guidelines for activation and introduction, 4) specific methods for promoting and activating artificial intelligence Should be presented. The proposed artificial intelligence activation method performs a procedure to verify and confirm the effectiveness of artificial intelligence nurturing through a multi-faceted approach. The multi-faceted analysis approach includes business ecosystem aspects, industry-specific aspects including companies, technology fields, policy aspects, public and non-public services aspects, government-led and private-led aspects. Therefore, it can be reviewed as a method of inducing activation in various forms. In the future research field, it is necessary to prove the effectiveness of the proposed activation plan based on empirical data on artificial intelligence-based services. The expected effect of this study is to contribute to support the development of artificial intelligence technology and to establish related policies.

A Study on Business Promotion Procedure and Service Model for Ubiquitous Sensor Network Based Ground Facility Management (USN 기반의 지상시설물 관리를 위한 추진절차 및 서비스 모델 연구)

  • Jeong, Jin-Seok;Kim, Eui-Myoung;Lee, Yong-Joo;Byun, In-Sun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.4
    • /
    • pp.433-442
    • /
    • 2008
  • This research dealt with the methodological procedures of ubiquitous sensor networks, applying to urban ground facilities. Recently Korean government established a guide, "u-City IT Infra guide v1.0" when promoting u-City implement projects. This guide conceptually included general processes about u-City mainframe in overall, but its guidance could not lead the detailed procedures and methods for specific ground facility. Therefore, this research proposed the details of the procedure for the intelligence of facilities after reviewing the existing procedures for ubiquitous city. Newly proposed procedure for the intelligence of facilities was consisted of selection of facility and sensors for intelligence, setting a level for intelligence, and suggestion of service model for the selected facility.

Implementation of Artificial Intelligence Speech Recognition Text Repository for Elementary Career Counseling (초등 진로 상담을 위한 인공지능 음성 인식 텍스트 레포지토리 구현)

  • Yu, Minjeong;Ma, Youngji;Koo, Dukhoi
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.327-333
    • /
    • 2021
  • Currently development of the Artificial Intelligence technology is rapidly progressing in the era of the Fourth Industrial Revolution. The government is trying to improve the education of Artificial Intelligence and cultivating human resources. However there are very few cases where A.I technology is actually used in public education classes. Therefore we designed a text repository by implementing A.I speech recognition to provide career counseling for elementary school students. In the meantime, there have been many difficulties in giving advance consultations required for students' career counseling. In this study we suggested A.I speech recognition technology which can solve addressed problem and we planned various ways to make the program more educational. To conclude we expect A.I technology implemented in this study provides effective solution to career counseling.

  • PDF

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Policy Analysis on AI SW Human Resources Development Using Cognitive Map Analysis (인지지도분석을 활용한 AI SW 인력양성 정책분석)

  • Lee, Jung Mann
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.109-125
    • /
    • 2021
  • For the government of president Moon's AI SW HRD policy, he proclaimed AI democracy that anyone can utilize artificial intelligence technology to spread AI education for the people of the country. Through cognitive map analysis, this study presents expected policy outcomes due to the input of policy factors to overcome crisis factors and utilize opportunity factors. According to the cognitive guidance analysis, first, the opportunity factor is recognized as accelerating the digital transformation to Covid 19 if AI SW HRD is well nurtured. Second, the crisis factor refers to the rapid paradigm shift caused by the intelligence information society, resulting in job losses in the manufacturing sector and deepening imbalance in manpower supply and demand, especially in the artificial intelligence sector. Third, the comprehensive cognitive map shows a circular process for creating an AI SW ecosystem in response to threats caused by untact caused by Corona and a circular process for securing AI talent in response to threats caused by deepening imbalance in manpower supply and demand in the AI sector. Fourth, in order to accelerate the digital circulation that has been accelerated by Corona, we found a circular process to succeed in the Korean version of digital new deal by strengthening national and corporate competitiveness through AI-utilized capacity and industrial and regional AI education. Finally, the AI utilization empowerment strengthening rotation process is the most dominant of the four mechanisms, and we also found a relatively controllable feedback loop to obtain policy outputs.