• Title/Summary/Keyword: Public cloud

Search Result 308, Processing Time 0.023 seconds

Research on the change of perception of abandoned dogs through big data analysis

  • Jang, Ji-Yun;Lee, Seok-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.115-123
    • /
    • 2021
  • This study aims to analyze the changes in public perception of abandoned dogs through big data analysis. Data from January 2017 to July 2020 were collected to analyze how the quantitative change in social issues with abandoned dogs as a keyword had an effect on public perception of abandoned dogs, and factors that influence positive/negative perceptions. As a result of the study, it was confirmed that the number of stray dogs and the number of documents related to stray dogs had a positive correlation, and specific time series changes were found through various analysis techniques such as text mining, network analysis, and sentiment analysis. This study will have significance as basic data that can be used for policy establishment or other research on abandoned dogs. we hope it will help to solve problems so as to improve awareness of abandoned dogs and develop a sense of responsibility.

Curation Service Implementation using Machine Learning Algorithm (기계학습 알고리즘을 이용한 Curation 서비스 구현)

  • Lee, Hyung Ho;Lee, Hak Jae;Kim, Tae Su;Kim, Mi Hyun
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.118-125
    • /
    • 2020
  • This paper is conducted for automatically recommending and providing information services desired by users on websites of local governments and public institutions with vast amounts of information, In this system, we defined a method of collecting data based on the SiiRU CMS system that collects and preprocesses data, and a study that provides curation services (contents and menus) to users through a collaborative filtering algorithm based on machine learning. Also, the data used in the paper is conducted based on about 1 million data collected in 2019. The analyzed data can provide important information that cannot be easily accessed by providing a cloud tag service or recommended menu for users to conveniently view, and the environment configuration that can realize this service to local governments and public institutions is also provided.

Artificial Intelligence(AI) Fundamental Education Design for Non-major Humanities (비전공자 인문계열을 위한 인공지능(AI) 보편적 교육 설계)

  • Baek, Su-Jin;Shin, Yoon-Hee
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.285-293
    • /
    • 2021
  • With the advent of the 4th Industrial Revolution, AI utilization capabilities are being emphasized in various industries, but AI education design and curriculum research as universal education is currently lacking. This study offers a design for universal AI education to further cultivate its use in universities. For the AI basic education design, a questionnaire was conducted for experts three times, and the reliability of the derived design contents was verified by reflecting the results. As a result, the main competencies for cultivating AI literacy were data literacy, AI understanding and utilization, and the main detailed areas derived were data structure understanding and processing, visualization, word cloud, public data utilization, and machine learning concept understanding and utilization. The educational design content derived through this study is expected to increase the value of competency-centered AI universal education in the future.

An Exploratory Study on Construction of Electronic Government as Platform with Customized Public Services : to Improve Administrative Aspects of Administrative Processes and Information Systems (맞춤형 공공서비스제공을 위한 플랫폼 전자정부 구축방안에 대한 탐색적 연구: 행정프로세스와 행정정보시스템 개선측면에서)

  • Lee, Sang-Yun;Chung, Myungju
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.1-11
    • /
    • 2016
  • Currently Korean government is rushing the new electronic government system introduced as 'platform e-government' with big data and cloud computing technologies and systems, ultimately intending to provide the public institution services customized from the integrated counter or window for the heterogeneous resident services. In this regard, this study suggested how to design the new metadata information system in which mutual integration of information systems can take place, where heterogeneous services can be shared efficiently at the application and data unit, as a separate application that can provide a single one- stop service for residents' petition at the integrated level in the back-office based on the public data in possession of each of government ministries and related organizations. If this proposed system is implemented, the achievement of customized public service can be advanced one step forward in processing the petitions of the residents by organically connected link between 'Demand Chain' and 'Supply Chain' in the integrated window. In other words, it could be made possible through the unification of both the 'Supply Chain' performed in the office space of the officials at the back-office level and the 'Demand Chain' performed in the living space of the residents at the front-office level.

Video smoke detection with block DNCNN and visual change image

  • Liu, Tong;Cheng, Jianghua;Yuan, Zhimin;Hua, Honghu;Zhao, Kangcheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3712-3729
    • /
    • 2020
  • Smoke detection is helpful for early fire detection. With its large coverage area and low cost, vision-based smoke detection technology is the main research direction of outdoor smoke detection. We propose a two-stage smoke detection method combined with block Deep Normalization and Convolutional Neural Network (DNCNN) and visual change image. In the first stage, each suspected smoke region is detected from each frame of the images by using block DNCNN. According to the physical characteristics of smoke diffusion, a concept of visual change image is put forward in this paper, which is constructed by the video motion change state of the suspected smoke regions, and can describe the physical diffusion characteristics of smoke in the time and space domains. In the second stage, the Support Vector Machine (SVM) classifier is used to classify the Histogram of Oriented Gradients (HOG) features of visual change images of the suspected smoke regions, in this way to reduce the false alarm caused by the smoke-like objects such as cloud and fog. Simulation experiments are carried out on two public datasets of smoke. Results show that the accuracy and recall rate of smoke detection are high, and the false alarm rate is much lower than that of other comparison methods.

Towards Key Issues of Disaster Aid based on Wireless Body Area Networks

  • Liu, Jianqi;Wang, Qinruo;Wan, Jiafu;Xiong, Jianbin;Zeng, Bi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1014-1035
    • /
    • 2013
  • With recent advances in wireless communication and low-power miniaturized biomedical sensor and semiconductor technologies, wireless body area networks (WBAN) has become an integral part of the disaster aid system. Wearable vital sign sensors can track patients' status and location, thus enhancing disaster rescue efficiency. In the past few years, most of the literatures in the area of disaster aid system based on WBAN have focused on issues concerning wireless sensor design, sensor miniaturization, energy efficiency and communication protocols. In this paper, we will give an overview of disaster aid, discuss about the types of network communication as well as outline related issues. We will emphasize on analyzing six key issues in employing the disaster aid system. Finally, we will also highlight some of the challenges that still need to be addressed in the future in order to help the disaster aid system be truly and widely accepted by the public.

Efficiency Analysis of Chinese Blockchain Concept Stock Listed Companies

  • Yan, Hai-Shui;Kim, Hyung-Ho;Yang, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.17-27
    • /
    • 2020
  • With the continuous development and application of Internet technology, in recent years, new technologies such as cloud computing, big data, the Internet of Things, and AI are becoming more and more familiar to the general public. The development of a digital society has entered a new period of development. In this paper, we used on the 2018 annual data of 50 listed companies with blockchain concept stocks in China. Using data envelopment analysis (DEA) to study and analyze the input-output efficiency, it can be concluded that the input-output efficiency of 50 listed companies is very different. Inefficient companies are as high as 62%. Most companies have a large room for improvement in input-output efficiency due to uneconomical scale or inefficient technology. In order to better improve the company's input-output efficiency, one must improve the efficiency of resource utilization, optimize the company's research and development costs and the input and management of technical personnel; the second is to increase technological innovation and business innovation.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

Opinion-Mining Methodology for Social Media Analytics

  • Kim, Yoosin;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.391-406
    • /
    • 2015
  • Social media have emerged as new communication channels between consumers and companies that generate a large volume of unstructured text data. This social media content, which contains consumers' opinions and interests, is recognized as valuable material from which businesses can mine useful information; consequently, many researchers have reported on opinion-mining frameworks, methods, techniques, and tools for business intelligence over various industries. These studies sometimes focused on how to use opinion mining in business fields or emphasized methods of analyzing content to achieve results that are more accurate. They also considered how to visualize the results to ensure easier understanding. However, we found that such approaches are often technically complex and insufficiently user-friendly to help with business decisions and planning. Therefore, in this study we attempt to formulate a more comprehensive and practical methodology to conduct social media opinion mining and apply our methodology to a case study of the oldest instant noodle product in Korea. We also present graphical tools and visualized outputs that include volume and sentiment graphs, time-series graphs, a topic word cloud, a heat map, and a valence tree map with a classification. Our resources are from public-domain social media content such as blogs, forum messages, and news articles that we analyze with natural language processing, statistics, and graphics packages in the freeware R project environment. We believe our methodology and visualization outputs can provide a practical and reliable guide for immediate use, not just in the food industry but other industries as well.

A Study on Analysis on Geospatial Information Portal Trends (공간정보 포탈 동향 분석에 관한 연구)

  • Lee, In-Su;Lee, Jun-Seok
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.125-138
    • /
    • 2014
  • The portal is conceptualized as a discovery gateway to facilitate the communication and sharing of geographic data and information. Generally, Geospatial portal serve the different function and service according to the operational agents and goal. It was shown that Geospatial Portal might be constructed, based on the integration of the public data and Geospatial data portal, OpenAPI, shared Cloud Infrastructure. Ultimately, this study suggests the analysis results for Geospatial Information Prortal trends and contribute to the future development of Geospatial Information Open Platform(called Vworld).