{"title":"Dynamic Computation Offloading Based on Q-Learning for UAV-Based Mobile Edge Computing","authors":"Shreya Khisa, S. Moh","doi":"10.30693/smj.2023.12.3.68","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.68","url":null,"abstract":"Emerging mobile edge computing (MEC) can be used in battery-constrained Internet of things (IoT). The execution latency of IoT applications can be improved by offloading computation-intensive tasks to an MEC server. Recently, the popularity of unmanned aerial vehicles (UAVs) has increased rapidly, and UAV-based MEC systems are receiving considerable attention. In this paper, we propose a dynamic computation offloading paradigm for UAV-based MEC systems, in which a UAV flies over an urban environment and provides edge services to IoT devices on the ground. Since most IoT devices are energy-constrained, we formulate our problem as a Markov decision process considering the energy level of the battery of each IoT device. We also use model-free Q-learning for time-critical tasks to maximize the system utility. According to our performance study, the proposed scheme can achieve desirable convergence properties and make intelligent offloading decisions.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133827563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingeun Son, Gang-rok Lee, J. Y. Park, Mingyeong Choi
{"title":"Research on depression and emergency detection model using smartphone sensors","authors":"Mingeun Son, Gang-rok Lee, J. Y. Park, Mingyeong Choi","doi":"10.30693/smj.2023.12.3.9","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.9","url":null,"abstract":"Due to the deepening of COVID-19, high-intensity social distancing has been prolonged and many social problems have been cured. In particular, physical and psychological isolation occurred due to the non-face-to-face system and a lot of damage occurred. The various social problems caused by Corona acted as severe stress for all those affected by Corona 19, and eventually acted as a factor threatening mental health such as depression. While the number of people suffering from mental illness is increasing, the actual use of mental health services is low. Therefore, it is necessary to establish a system for people suffering from mental health problems. Therefore, in this study, depression detection and emergency detection models were constructed based on sensor information using smartphones from depressed subjects and general subjects. For the detection of depression and emergencies, VAE, DAGMM, ECOD, COPOD, and LGBM algorithms were used. As a result of the study, the depression detection model had an F1 score of 0.93 and the emergency situation detection model had an F1 score of 0.99. direction.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Eye Tracking Techniques using Wearable Devices","authors":"J. Jang, Jiuk Jung, Junghoon Park","doi":"10.30693/smj.2023.12.3.19","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.19","url":null,"abstract":"The eye tracking technology is widespread all around the society, and is demonstrating great performances in both preciseness and convenience. Hereby we can glimpse new possibility of an interface’s conduct without screen-touching. This technology can become a new way of conversation for those including but not limited to the patients suffering from Lou Gehrig’s disease, who are paralyzed each part by part of the body and finally cannot help but only moving eyes. Formerly in that case, the patients were given nothing to do but waiting for the death, even being unable to communicate with there families. A new interface that harnesses eyes as a new means of communication, although it conveys great difficulty, can be helpful for them. There surely are some eye tracking systems and equipment for their exclusive uses on the market. Notwithstanding, several obstacles including the complexity of operation and their high prices of over 12 million won($9,300) are hindering universal supply to people and coverage for the patients. Therefore, this paper suggests wearable-type eye tracking device that can support minorities and vulnerable people and be occupied inexpensively and study eye tracking method in order to maximize the possibility of future development across the world, finally proposing the way of designing and developing a brought-down costed eye tracking system based on high-efficient wearable device.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heng Zhou, Sunghoon Kim, Sang-Cheol Kim, Cheol-Won Kim, Seung-Won Kang
{"title":"Size Estimation for Shrimp Using Deep Learning Method","authors":"Heng Zhou, Sunghoon Kim, Sang-Cheol Kim, Cheol-Won Kim, Seung-Won Kang","doi":"10.30693/smj.2023.12.3.112","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.112","url":null,"abstract":"Shrimp farming has been becoming a new source of income for fishermen in South Korea. It is often necessary for fishers to measure the size of the shrimp for the purpose to understand the growth rate of the shrimp and to determine the amount of food put into the breeding pond. Traditional methods rely on humans, which has huge time and labor costs. This paper proposes a deep learning-based method for calculating the size of shrimps automatically. Firstly, we use fine-tuning techniques to update the Mask RCNN model with our farm data, enabling it to segment shrimps and generate shrimp masks. We then use skeletonizing method and maximum inscribed circle to calculate the length and width of shrimp, respectively. Our method is simple yet effective, and most importantly, it requires a small hardware resource and is easy to deploy to shrimp farms.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eligibility Verification based on Immutable Personal Information without Revealing the Owner’s Identity","authors":"Jun-Cheol Park","doi":"10.30693/smj.2023.12.3.38","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.38","url":null,"abstract":"When an individual needs to prove eligibility, it is sufficient to know whether or not s/he meets the eligibility, but any existing method inevitably exposes the identity of the owner or unnecessary additional information in the process of providing personal information. In this paper, among the immutable items of personal information such as gender, date of birth, and place of birth, we propose a method in which the owner provides only essential item(s) to the eligibility verifier with each iterm marked on one option among multiple choices. In this way, the eligibility verifier can access the combination of items stored in the blockchain with the consent of the information owner, and can safely store the access history by requesting recording in the blockchain again. In the proposed method, the user does not worry about his/her identity being revealed or his/her personal information being overly exposed, and the eligibility verifier can check only necessary items and search later records without separately storing the records.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114560093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Invisible to Irresistible: Intellectual Property and Digital Media & Entertainment Ventures in Korea","authors":"Eunjung Hyun","doi":"10.30693/smj.2023.12.3.93","DOIUrl":"https://doi.org/10.30693/smj.2023.12.3.93","url":null,"abstract":"In this paper, we investigate the relationship between a company's Intellectual Property (IP) portfolio strength and its success in obtaining venture funding in the Korean digital media & entertainment industry. Using data from 685 Korean digital media & entertainment companies registered in Crunchbase, a global database provider of venture funding information, we found that a strong IP portfolio is positively associated with funding success. Furthermore, our study revealed that the effect of IP portfolio strength on funding success is stronger for younger companies, suggesting that IP portfolio is more critical for firms that have less reputation and track record.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Korean Speech De-identification Performance of Speech De-identification Model and Broadcast Voice Modulation","authors":"Seung Min Kim, Dae Eol Park, Dae Seon Choi","doi":"10.30693/smj.2023.12.2.56","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.56","url":null,"abstract":"In broadcasts such as news and coverage programs, voice is modulated to protect the identity of the informant. Adjusting the pitch is commonly used voice modulation method, which allows easy voice restoration to the original voice by adjusting the pitch. Therefore, since broadcast voice modulation methods cannot properly protect the identity of the speaker and are vulnerable to security, a new voice modulation method is needed to replace them. In this paper, using the Lightweight speech de-identification model as the evaluation target model, we compare speech de-identification performance with broadcast voice modulation method using pitch modulation. Among the six modulation methods in the Lightweight speech de-identification model, we experimented on the de-identification performance of Korean speech as a human test and EER(Equal Error Rate) test compared with broadcast voice modulation using three modulation methods: McAdams, Resampling, and Vocal Tract Length Normalization(VTLN). Experimental results show VTLN modulation methods performed higher de-identification performance in both human tests and EER tests. As a result, the modulation methods of the Lightweight model for Korean speech has sufficient de-identification performance and will be able to replace the security-weak broadcast voice modulation.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124041880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Network using gradCAM","authors":"Chan Hyung Baek, J. Kwon, H. Jung","doi":"10.30693/smj.2023.12.2.9","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.9","url":null,"abstract":"In this paper, we proposed a face recognition network which attempts to use more facial features awhile using smaller number of training sets. When combining the neural network together for face recognition, we want to use networks that use different part of the facial features. However, the network training chooses randomly where these facial features are obtained. Other hand, the judgment basis of the network model can be expressed as a saliency map through gradCAM. Therefore, in this paper, we use gradCAM to visualize where the trained face recognition model has made a observations and recognition judgments. Thus, the network combination can be constructed based on the different facial features used. Using this approach, we trained a network for small face recognition problem. In an simple toy face recognition example, the recognition network used in this paper improves the accuracy by 1.79% and reduces the equal error rate (EER) by 0.01788 compared to the conventional approach.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae-hun Cho, Jae Min Park, Tae Hyeop Kim, Seung Wook Lee, Jiyeon Kim
{"title":"Machine Learning-based Detection of HTTP DoS Attacks for Cloud Web Applications","authors":"Jae-hun Cho, Jae Min Park, Tae Hyeop Kim, Seung Wook Lee, Jiyeon Kim","doi":"10.30693/smj.2023.12.2.66","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.66","url":null,"abstract":"Recently, the number of cloud web applications is increasing owing to the accelerated migration of enterprises and public sector information systems to the cloud. Traditional network attacks on cloud web applications are characterized by Denial of Service (DoS) attacks, which consume network resources with a large number of packets. However, HTTP DoS attacks, which consume application resources, are also increasing recently; as such, developing security technologies to prevent them is necessary. In particular, since low-bandwidth HTTP DoS attacks do not consume network resources, they are difficult to identify using traditional security solutions that monitor network metrics. In this paper, we propose a new detection model for detecting HTTP DoS attacks on cloud web applications by collecting the application metrics of web servers and learning them using machine learning. We collected 18 types of application metrics from an Apache web server and used five machine learning and two deep learning models to train the collected data. Further, we confirmed the superiority of the application metrics-based machine learning model by collecting and training 6 additional network metrics and comparing their performance with the proposed models. Among HTTP DoS attacks, we injected the RUDY and HULK attacks, which are low- and high-bandwidth attacks, respectively. As a result of detecting these two attacks using the proposed model, we found out that the F1 scores of the application metrics-based machine learning model were about 0.3 and 0.1 higher than that of the network metrics-based model, respectively.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miyeong Kim, Daegyeom Kim, Jong-Min Jang, Sang-jun Park, Souhwan Jung, Jungsoo Park
{"title":"A Study on Zero Trust Technology Trends","authors":"Miyeong Kim, Daegyeom Kim, Jong-Min Jang, Sang-jun Park, Souhwan Jung, Jungsoo Park","doi":"10.30693/smj.2023.12.2.15","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.15","url":null,"abstract":"Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}