• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.033 seconds

Research on Generative AI for Korean Multi-Modal Montage App (한국형 멀티모달 몽타주 앱을 위한 생성형 AI 연구)

  • Lim, Jeounghyun;Cha, Kyung-Ae;Koh, Jaepil;Hong, Won-Kee
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.13-26
    • /
    • 2024
  • Multi-modal generation is the process of generating results based on a variety of information, such as text, images, and audio. With the rapid development of AI technology, there is a growing number of multi-modal based systems that synthesize different types of data to produce results. In this paper, we present an AI system that uses speech and text recognition to describe a person and generate a montage image. While the existing montage generation technology is based on the appearance of Westerners, the montage generation system developed in this paper learns a model based on Korean facial features. Therefore, it is possible to create more accurate and effective Korean montage images based on multi-modal voice and text specific to Korean. Since the developed montage generation app can be utilized as a draft montage, it can dramatically reduce the manual labor of existing montage production personnel. For this purpose, we utilized persona-based virtual person montage data provided by the AI-Hub of the National Information Society Agency. AI-Hub is an AI integration platform aimed at providing a one-stop service by building artificial intelligence learning data necessary for the development of AI technology and services. The image generation system was implemented using VQGAN, a deep learning model used to generate high-resolution images, and the KoDALLE model, a Korean-based image generation model. It can be confirmed that the learned AI model creates a montage image of a face that is very similar to what was described using voice and text. To verify the practicality of the developed montage generation app, 10 testers used it and more than 70% responded that they were satisfied. The montage generator can be used in various fields, such as criminal detection, to describe and image facial features.

Evaluation of Disaster Resilience Scorecard for the UN International Safety City Certification of Incheon Metropolitan City (인천시 UN 국제안전도시 인증을 위한 재난 복원력 스코어카드 평가)

  • Kim, Yong-Moon;Lee, Tae-Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.59-75
    • /
    • 2020
  • This study is a case study that applied 'UNDRR's Urban Disaster Resilience Scorecard', an evaluation tool necessary for Incheon Metropolitan City to be certified as an international safe city. I would like to present an example that the results derived from this scorecard contributed to the Incheon Metropolitan City Disaster Reduction Plan. Of course, the Disaster Resilience Scorecard can't provide a way to improve the resilience of every disaster facing the city. However, it is to find the weakness of the resilience that the city faces, and to propose a solution to reduce the city's disaster risk. This is to help practitioners to recognize the disaster risks that Incheon Metropolitan City faces. In addition, the solution recommended by UNDRR was suggested to provide resilience in areas vulnerable to disasters. It was confirmed that this process can contribute to improving the disaster resilience of Incheon Metropolitan City. UNDRR has been spreading 'Climate Change, Disaster-resistant City Creation Campaign', aka MCR (Making Cities Resilient) Campaign, to cities all over the world since 2010 to reduce global cities' disasters. By applying the disaster relief guidelines adopted by UNDRR, governments, local governments, and neighboring cities are encouraged to collaborate. As a result of this study, Incheon Metropolitan city's UN Urban Resilience Scorecard was evaluated as a strong resilience field by obtaining scores of 4 or more (4.3~5.0) in 5 of 10 essentials; 1. Prepare organization for disaster resilience and prepare for implementation, 4. Strong resilience Urban development and design pursuit, 5. Preservation of natural cushions to enhance the protection provided by natural ecosystems, 9. Ensure effective disaster preparedness and response, 10. Rapid restoration and better reconstruction. On the other hand, in the other five fields, scores of less than 4 (3.20~3.85) were obtained and evaluated as weak resilience field; 2. Analyze, understand and utilize current and future risk scenarios, 3. Strengthen financial capacity for resilience, 6. Strengthen institutional capacity for resilience, 7. Understanding and strengthening social competence for resilience, 8. Strengthen resilience of infrastructure. In addition, through this study, the risk factors faced by Incheon Metropolitan City could be identified by priority, resilience improvement measures to minimize disaster risks, urban safety-based urban development plans, available disaster reduction resources, and integrated disasters. Measures were prepared.

Disaster Risk Assessment using QRE Assessment Tool in Disaster Cases in Seoul Metropolitan (서울시 재난 사례 QRE 평가도구를 활용한 재난 위험도 평가)

  • Kim, Yong Moon;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.1
    • /
    • pp.11-21
    • /
    • 2019
  • This study assessed the risk of disaster by using QRE(Quick Risk Estimation - UNISDR Roll Model City of Basic Evaluation Tool) tools for three natural disasters and sixteen social disasters managed by the Seoul Metropolitan Government. The criteria for selecting 19 disaster types in Seoul are limited to disasters that occur frequently in the past and cause a lot of damage to people and property if they occur. We also considered disasters that are likely to occur in the future. According to the results of the QRE tools for disaster type in Seoul, the most dangerous type of disaster among the Seoul city disasters was "suicide accident" and "deterioration of air quality". Suicide risk is high and it is not easy to take measures against the economic and psychological problems of suicide. This corresponds to the Risk ratings(Likelihood ranking score & Severity rating) "M6". In contrast, disaster types with low risk during the disaster managed by the city of Seoul were analyzed as flooding, water leakage, and water pollution accidents. In the case of floods, there is a high likelihood of disaster such as localized heavy rains and typhoons. However, the city of Seoul has established a comprehensive plan to reduce floods and water every five years. This aspect is considered to be appropriate for disaster prevention preparedness and relatively low disaster risk was analyzed. This corresponds to the disaster Risk ratings(Likelihood ranking score & Severity rating) "VL1". Finally, the QRE tool provides the city's leaders and disaster managers with a quick reference to the risk of a disaster so that decisions can be made faster. In addition, the risk assessment using the QRE tool has helped many aspects such as systematic evaluation of resilience against the city's safety risks, basic data on future investment plans, and disaster response.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

Validation Technique of Simulation Model using Weighted F-measure with Hierarchical X-means (WF-HX) Method (계층적 X-means와 가중 F-measure를 통한 시뮬레이션 모델 검증 기법)

  • Yang, Dae-Gil;HwangBo, Hun;Cheon, Hyun-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.562-574
    • /
    • 2012
  • Simulation validation techniques which have been employed in most studies are statistical analysis, which validate a model with mean or variance of throughput and resource utilization as an evaluation object. However, these methods have not been able to ensure the reliability of individual elements of the model well. To overcome the problem, the weighted F-measure method was proposed, but this technique also had some limitations. First, it is difficult to apply the technique to complex system environment with numerous values of interarrival time because it assigns a class to an individual value of interarrival time. In addition, due to unbounded weights, the value of weighted F-measure has no lower bound, so it is difficult to determine its threshold. Therefore, this paper propose weighted F-measure technique with cluster analysis to solve these problems. The classes for the technique are defined by each cluster, which reduces considerable number of classes and enables to apply the technique to various systems. Moreover, we improved the validation technique in the way of assigning minimum bounded weights without any lack of objectivity.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

A Study on Policy Making for e-Navigation from the Viewpoint of a Maritime Digital Communication Network (e-Navigation을 위한 해상디지털통신 구축에 관한 정책 연구)

  • Lim, Hyuntaek;Cho, Yong-Gab
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.679-685
    • /
    • 2018
  • In order to reduce marine accidents using advanced information and communication technology, various research and development projects are conducted globally on e-Navigation related technologies and services. Existing studies do not provide policy measures for LTE-M. In order for these technologies and services to be installed on vessels and to contribute to the prevention of accidents at sea, the law should be expand operational organizations and systems. In particular, communication equipment and related technical standards should be prepared, and its digital communication technology (LTE-M, VDES, Digital-MF / HF, etc.) In this study, we conducted short, medium, and long term performance assessment of the identification system and the policy for effective implementation of Korean e-Navigation. We presented a visible plan of the relevant policy. For example, e-Navigation core services, e-Navigation communication networks and operating systems, e-Navigation international standard leading technologies and e-navigation services activated in the field. To do this, we conducted research based on the progress data of the Korean e-Navigation project, which was led by the Ministry of Maritime Affairs and Fisheries, and conducted research discussions with practitioners and experts in related fields. As a result of this study, it is expected that the proposed policies will contribute to the reduction of marine accidents, the promotion of the maritime industry and the development of additional government policies for national security.

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

An Empirical Study on the Influencing Factors of Intention to Adoption of Mobile Government Service (모바일 전자정부 서비스 수용의도의 영향요인에 관한 연구)

  • Han, Kihun;Kim, Jinsoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.77-104
    • /
    • 2013
  • Mobile technology is accelerating innovative changes across all fields of our society as well as business environments. Especially, demands on mobile government (M-government) services have been increased gradually since e-government has improved national administration services dramatically. However, high-quality services which are acceptable to may users are not actually supplied because technical issues such as security on mobile e-government services have not solved and governance policy was not established yet. Previous studies show that most researches are devoted to technical ones or limited to theoretical exploratory study. As a result, developing useful guidelines which are practically and theoretically proved is one of the very important research issues. This study reviews the previous research works such as concept of mobile, e-government, M-government, technical trends of mobile, market situations, present status, and various case studies. And then we develop a research model with five factors, twenty four variables and seventy six measurement for measuring the influencing factors to adoption of M-government services. The model is composed of total 16 hypotheses, 22 variables, and 76 measurements. The model is analyzed by using statistical package SPSS (18.0) and AMOS (18.0) together with structural equation method based on 294 samples. The results show that the model is valid and there are statistically significant influence between ease of use and usefulness, ease of use and user's satisfactions, usefulness and intent of re-use, and user's satisfactions and intent of re-use, excepting usefulness and user's satisfaction, ease of use and intent of re-use did not affect significant influences. Especially, service quality, system quality, and relationship quality are identified as influencing factors to adaption of M-government service. The results are expected to provide a theoretical research framework which generate new research issues in M-government service area. It also can provide an useful guidelines to practical experts in successfully implementing M-government services. Further research directions are as follows. User's intents have to be studied in details by classifying users by individual, enterprise, and government as well as developing a new hypothetical model. Since M-government service is at the initial stage, longitudinal studies have to be conducted to trace the peoples' need in order to develop new high-quality mobile services.