• Title/Summary/Keyword: automatically

Search Result 6,815, Processing Time 0.028 seconds

User-independent blockchain donation system

  • Sang-Dong Sul;Su-Jeong Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.113-123
    • /
    • 2023
  • This paper introduces the Cherry system, a user-independent blockchain donation system. This is a procedure that is delivered to the beneficiary's bank account through a virtual account when a donor makes a donation, so there is no difference from the existing donation delivery method from the user's point of view However, within the blockchain, Cherry Points, a virtual currency based on the user ID, are issued and delivered to the beneficiary, while all transactions and the beneficiary's usage history are managed on the blockchain. By adopting this method, there was an improvement in blockchain performance, with transaction processing exceeding 1,000 TPS in typical transaction condition and service completion within 21.3 seconds. By applying the automatic influence control algorithm to this system, the influence according to stake, which is an individual donation, is greatly reduced to 0.3 after 2 months, thereby concentrating influence could be controlled automatically. In addition, it was designed to enable micro tracking by adding a tracking function by timestamp to the donation ledger for each individual ID, which greatly improved the transparency in the use of donations. From a service perspective, existing blockchain donation systems were handled as limited donation delivery methods. Since it is a direct service in a user-independent method, convenience has been greatly improved by delivering donations in various forms.

A Study on Automatic Discovery and Summarization Method of Battlefield Situation Related Documents using Natural Language Processing and Collaborative Filtering (자연어 처리 및 협업 필터링 기반의 전장상황 관련 문서 자동탐색 및 요약 기법연구)

  • Kunyoung Kim;Jeongbin Lee;Mye Sohn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.127-135
    • /
    • 2023
  • With the development of information and communication technology, the amount of information produced and shared in the battlefield and stored and managed in the system dramatically increased. This means that the amount of information which cansupport situational awareness and decision making of the commanders has increased, but on the other hand, it is also a factor that hinders rapid decision making by increasing the information overload on the commanders. To overcome this limitation, this study proposes a method to automatically search, select, and summarize documents that can help the commanders to understand the battlefield situation reports that he or she received. First, named entities are discovered from the battlefield situation report using a named entity recognition method. Second, the documents related to each named entity are discovered. Third, a language model and collaborative filtering are used to select the documents. At this time, the language model is used to calculate the similarity between the received report and the discovered documents, and collaborative filtering is used to reflect the commander's document reading history. Finally, sentences containing each named entity are selected from the documents and sorted. The experiment was carried out using academic papers since their characteristics are similar to military documents, and the validity of the proposed method was verified.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Design and Implementation of an Ethereum-Based Deliverables Management System for Public Information Software Project (이더리움 기반 공공정보 소프트웨어 사업산출물 관리 시스템 설계 및 구현)

  • Lee, Eun Ju;Kim, Jin Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.175-184
    • /
    • 2022
  • Blockchain is being studied in various fields such as logistics, fintech, medical care, and the public sector. In the public information software project, some deliverables are omitted because the developed deliverables and the deliverables requested by the project management methodology do not match, and an additional process is required for payment. In this paper, we propose the deliverables management system for public information software project which is configured a distributed environment using the Ethereum blockchain and which has an automatic payment system only when all deliverables are approved. This system can keep the service available in case of system failure, provide transparency and traceability of deliverables management, and can reduce conflicts between the ordering company and the contractor through automatic payment. In this system, the information of deliverables is stored in the blockchain, and the deliverables that their file name is the hash value calculated by using the version information and the hash value of the previous version deliverable, are stored in the SFTP server. Experimental results show that the hash value of the deliverables registered by the contractor is correct, the file name of the deliverables stored in the SFTP server is the same as the hash value registered in the Ethereum blockchain, and the payment is made automatically to the Ethereum address of the contractor when all deliverables are approved.

A Theoretical Examination of Economy as Viewed in Confucianist and Daesoon Thought: Focusing on Similarities (유학과 대순사상의 경제관 시론적 고찰 - 유사점을 중심으로 -)

  • An Yoo-kyoung
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.46
    • /
    • pp.153-188
    • /
    • 2023
  • This paper aims to confirm theoretical similarities and differences by comparing and considering the economic views of Neo-Confucianism and Daesoon Thought. Through this, there can be an examination of what implications traditional thought regarding economic views can have in today's social climate, which considers economic value to be the greatest value. This can also to help establish a desirable economic view of our society. In conclusion, it can be observed that economic issues are viewed in Daesoon Thought similarly to how they were perceived by Zhu Xi. Which is to say that both place greater relative importance on morality than material wealth. These systems of thought appear to place more emphasis on the spiritual world and moral conduct than on the material world and its economy. Therefore, when looking at the interpretation of loyalty and profit, nature and humanity, the heart and humanity, conscience and selfishness, and other such pairings, there is a tendency to focus more on the spiritual world and moral excellence than on the material world and the pursuit of wealth. These systems of thought acknowledge that material needs exist; however, both move to instill values such that human society pursues moral and spiritual ventures over material gain. Therefore, the position arrived upon by both is that people's morality is the highest good, and when people's morality is fully realized, all social problems, including economic problems, will be solved automatically. This is the theoretical structure and ideological characteristics that constitutes the economic viewpoints posited in both Zhu Xi's Neo-Confucianist thought and Daesoon Thought.

Implementation of AI-based Object Recognition Model for Improving Driving Safety of Electric Mobility Aids (객체 인식 모델과 지면 투영기법을 활용한 영상 내 다중 객체의 위치 보정 알고리즘 구현)

  • Dong-Seok Park;Sun-Gi Hong;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.119-125
    • /
    • 2023
  • In this study, we photograph driving obstacle objects such as crosswalks, side spheres, manholes, braille blocks, partial ramps, temporary safety barriers, stairs, and inclined curb that hinder or cause inconvenience to the movement of the vulnerable using electric mobility aids. We develop an optimal AI model that classifies photographed objects and automatically recognizes them, and implement an algorithm that can efficiently determine obstacles in front of electric mobility aids. In order to enable object detection to be AI learning with high probability, the labeling form is labeled as a polygon form when building a dataset. It was developed using a Mask R-CNN model in Detectron2 framework that can detect objects labeled in the form of polygons. Image acquisition was conducted by dividing it into two groups: the general public and the transportation weak, and image information obtained in two areas of the test bed was secured. As for the parameter setting of the Mask R-CNN learning result, it was confirmed that the model learned with IMAGES_PER_BATCH: 2, BASE_LEARNING_RATE 0.001, MAX_ITERATION: 10,000 showed the highest performance at 68.532, so that the user can quickly and accurately recognize driving risks and obstacles.

Development of Electromyographic Signal Responsive Walking Rehabilitation Robot System Enables Exercise Considering Muscle Condition (근육 상태를 고려한 운동이 가능한 근전도 신호 반응형 보행 재활 로봇 시스템 개발)

  • Sang-Il Park;Chang-Su Mun;Eon-Hyeok Kwon;Seong-Won Kim;Si-Cheol Noh
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.126-133
    • /
    • 2023
  • In this study, electromyography was obtained in the six muscle areas that move the joints of the two legs, and by analyzing it, an exercise robot system capable of gait rehabilitation was proposed in consideration of the individual's muscle state. Through this, the system was constructed to prevent the effect of exercise from decreasing because the patient's will was not reflected when walking exercise was simply provided automatically. As a result of the evaluation of the developed system, it was confirmed that the pedestrian rehabilitation robot system manufactured through this study had performance suitable for the design requirements, and it was also confirmed that the usability evaluation was comprehensively satisfactory. The results of this study are thought to be of great help to patients who are having difficulty in gait rehabilitation, and are believed to be helpful in the development of electromyography signal-based gait robot systems.

Difference Factors Analysis of between Quantity Take-off Using BIM Model and Using 2D Drawings in Reinforced Concrete Building Frame (건물 골조수량 산출 시 BIM모델 기반 수량과 2D도면 기반 수량 차이 요인 분석)

  • Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.5
    • /
    • pp.651-662
    • /
    • 2023
  • Recently, research on the use of Building Information Modeling(BIM) for various construction management activities is being actively conducted, and interest in 3D model-based estimation is increasing because it has the advantage of being able to be automatically performed using the attribute information of the 3D model. Therefore, this study aimed that the difference in the quantities is calculated the quantity based on the 2D drawing of a building and is extracted from the 3D model created by the Revit software was compared and tried to find out the cause. The difference in the quantity calculated by the two methods was the largest in the formwork, followed by the smallest in the order of the quantity of rebar and concrete. The reason for this difference is that there is a part where the quantity extraction in the 3D model is not suitable for the quantity calculation standard, and in particular, in the case of formwork, it was difficult to separate only the quantity of the necessary part. In addition, since the quantity of rebar was not separated by member, it was impossible to accurately compare the quantity and identify the cause of the difference. Therefore, it is considered to be the most reasonable to use application software that imports only the numerical information necessary for quantity calculation from the 3D model and applies a separate calculation formula.

AI-based stuttering automatic classification method: Using a convolutional neural network (인공지능 기반의 말더듬 자동분류 방법: 합성곱신경망(CNN) 활용)

  • Jin Park;Chang Gyun Lee
    • Phonetics and Speech Sciences
    • /
    • v.15 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • This study primarily aimed to develop an automated stuttering identification and classification method using artificial intelligence technology. In particular, this study aimed to develop a deep learning-based identification model utilizing the convolutional neural networks (CNNs) algorithm for Korean speakers who stutter. To this aim, speech data were collected from 9 adults who stutter and 9 normally-fluent speakers. The data were automatically segmented at the phrasal level using Google Cloud speech-to-text (STT), and labels such as 'fluent', 'blockage', prolongation', and 'repetition' were assigned to them. Mel frequency cepstral coefficients (MFCCs) and the CNN-based classifier were also used for detecting and classifying each type of the stuttered disfluency. However, in the case of prolongation, five results were found and, therefore, excluded from the classifier model. Results showed that the accuracy of the CNN classifier was 0.96, and the F1-score for classification performance was as follows: 'fluent' 1.00, 'blockage' 0.67, and 'repetition' 0.74. Although the effectiveness of the automatic classification identifier was validated using CNNs to detect the stuttered disfluencies, the performance was found to be inadequate especially for the blockage and prolongation types. Consequently, the establishment of a big speech database for collecting data based on the types of stuttered disfluencies was identified as a necessary foundation for improving classification performance.

Safety Verification Techniques of Privacy Policy Using GPT (GPT를 활용한 개인정보 처리방침 안전성 검증 기법)

  • Hye-Yeon Shim;MinSeo Kweun;DaYoung Yoon;JiYoung Seo;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.207-216
    • /
    • 2024
  • As big data was built due to the 4th Industrial Revolution, personalized services increased rapidly. As a result, the amount of personal information collected from online services has increased, and concerns about users' personal information leakage and privacy infringement have increased. Online service providers provide privacy policies to address concerns about privacy infringement of users, but privacy policies are often misused due to the long and complex problem that it is difficult for users to directly identify risk items. Therefore, there is a need for a method that can automatically check whether the privacy policy is safe. However, the safety verification technique of the conventional blacklist and machine learning-based privacy policy has a problem that is difficult to expand or has low accessibility. In this paper, to solve the problem, we propose a safety verification technique for the privacy policy using the GPT-3.5 API, which is a generative artificial intelligence. Classification work can be performed evenin a new environment, and it shows the possibility that the general public without expertise can easily inspect the privacy policy. In the experiment, how accurately the blacklist-based privacy policy and the GPT-based privacy policy classify safe and unsafe sentences and the time spent on classification was measured. According to the experimental results, the proposed technique showed 10.34% higher accuracy on average than the conventional blacklist-based sentence safety verification technique.