• Title/Summary/Keyword: 대안금융

Search Result 134, Processing Time 0.023 seconds

Process of Capital Accumulation and Urbanization in S.Korea: Urban Crisis and Alternatives (한국의 자본축적 과정과 도시화: 도시 위기와 대안)

  • Choi, Byung-Doo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.3
    • /
    • pp.512-534
    • /
    • 2016
  • This paper is to see what appears to be an economic crisis as urban crisis, to explore its emerging process and its major distinctive figures in the context of S. Korea, and to consider alternatives to overcome such an urban crisis. For this purpose, it first tries to show that the capitalist economic development (i.e. capital accumulation) has been stimulated and driven largely by extending investments into built environments. Then it analyzes how crises of overaccumulation, coupled with other crises such as the IMF crisis in 1997 and the financial crisis in 2008 which have been brought about by serious impacts of foreign financial capitals working on the global level, have led to accumulating of huge surplus reserves within both big companies and the central government on the one hand, increasing tremendously debts of households as well as government and private companies on the other. In particular, the debt crisis seems to be accelerated by fictitious capital generated through government's financial strategies to promote both supplies and demands in housing and property markets. There seem several ways of overcoming the urban crisis spiraled around accumulating surplus capital and increasing financial debt; raising real income, moderating investments into built environment, and increasing inputs into the fields of technology and well-being. In order to open up these ways, it is concluded, recent urban movements in terms of the right to the city are required not only to make the government and capital to do so, but also to realize interest of urban people who have produced such surplus but who are suffering from the debt crisis.

  • PDF

A numerical study on option pricing based on GARCH models with normal mixture errors (정규혼합모형의 오차를 갖는 GARCH 모형을 이용한 옵션가격결정에 대한 실증연구)

  • Jeong, Seung Hwan;Lee, Tae Wook
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.2
    • /
    • pp.251-260
    • /
    • 2017
  • The option pricing of Black와 Scholes (1973) and Merton (1973) has been widely reported to fail to reflect the time varying volatility of financial time series in many real applications. For example, Duan (1995) proposed GARCH option pricing method through Monte Carlo simulation. However, financial time series is known to follow a fat-tailed and leptokurtic probability distribution, which is not explained by Duan (1995). In this paper, in order to overcome such defects, we proposed the option pricing method based on GARCH models with normal mixture errors. According to the analysis of KOSPI200 option price data, the option pricing based on GARCH models with normal mixture errors outperformed the option pricing based on GARCH models with normal errors in the unstable period with high volatility.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

Trading Strategies Using Reinforcement Learning (강화학습을 이용한 트레이딩 전략)

  • Cho, Hyunmin;Shin, Hyun Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.123-130
    • /
    • 2021
  • With the recent developments in computer technology, there has been an increasing interest in the field of machine learning. This also has led to a significant increase in real business cases of machine learning theory in various sectors. In finance, it has been a major challenge to predict the future value of financial products. Since the 1980s, the finance industry has relied on technical and fundamental analysis for this prediction. For future value prediction models using machine learning, model design is of paramount importance to respond to market variables. Therefore, this paper quantitatively predicts the stock price movements of individual stocks listed on the KOSPI market using machine learning techniques; specifically, the reinforcement learning model. The DQN and A2C algorithms proposed by Google Deep Mind in 2013 are used for the reinforcement learning and they are applied to the stock trading strategies. In addition, through experiments, an input value to increase the cumulative profit is selected and its superiority is verified by comparison with comparative algorithms.

A Stuffy on Economic Evaluation of Information Telecommunication Venture Business (인터넷 벤처비즈니스의 평가체계에 관한 연구)

  • 이명호;이우형
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.126-129
    • /
    • 2000
  • 무한경쟁시대를 맞이하여 세계는 고 부가가치 경제구조로 전환이 빨라지고 있는 이 시점에서, 대기업을 중심으로 한 성장프라이드 정책에 의해 진행되어온 우리 경제구조가 IMF구제 금융을 받아들임으로써 그 한계를 들어내고 이에 대한 대안으로 떠 오른 것이 벤처기업이다. 벤처기업은 정보동신, 소프트웨어, 첨단산업분야를 주요 사업 영역으로 삼고 있으면, 첨단 고 부가가치 기술을 보유하고 있기 때문에 이에 정보통신부는 정보통신분야의 벤처기업에 대한 투자자금 공급기반을 확충하기 위해 2002년까지 총 4,000억원 정도의 정보통신 벤처기업 투자펀드를 조성할 계획이다. 이처럼 벤처기업의 중요성이 부각되고 있는 이 시점에서 이에 대한 공정하고 엄격한 성과측정이 중요시되고 있다. 경제성 평가모형과 관련한 연구는 재무적인 측면과 비재무적인 측면으로 구분하여 진행되어 왔으며, 본 연구에서는 비재무적 측면의 BSC(Balanced Score Card)를 가지고 경제성을 평가하려 한다. BSC는 기존의 재무적 실과지표 뿐만 아니라 고객관점, 내부 경영프로세스관점, 학습과 성장관점의 4가지 차원에서 통합적인 성과평가가 가능한 모형이다. 이를 위해 국내정보통신 벤처기업들을 대상으로 FGI(Focus Group Interview)를 실시하여 경제성 평가모형 구축에 필요한 항목들을 찾아내고 이를 바탕으로 경제성 분석 모형을 개발하였다.

  • PDF

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

A Study on the Automation of Engineering Simulations using Supercomputer (슈퍼컴퓨터를 활용한 공학 시뮬레이션 자동화에 관한 연구)

  • Kim, myung-il;Kim, jae-sung;Lee, sang-min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.553-554
    • /
    • 2011
  • 자동차, 선박, 기계부품 등의 분야에서 고성능 컴퓨터를 활용한 공학 시뮬레이션 기술은 이미 널리 활용되고 있으며, 바이오, 나노뿐 아니라 금융 분야까지 확대되고 있는 추세이다. 공학 시뮬레이션을 수행하기 위해서는 CFD(Computational Fluid Dynamics), 기계구조, 병렬수치해석 등에 대한 고급 지식이 요구되는데, 이로 인해 산업체에서의 활용이 활발하지 못한 것이 현실이다. 이러한 문제를 해결하기 위한 하나의 대안으로 공학 시뮬레이션 프로세스의 자동화 기술이 등장했으며, 열유체, 피로내구, 진동, 충돌 등의 분야에서 특정제품이나 기술에 대한 시스템이 제안되었다. 국내에서는 에어포일(airfoil), 팬(fan), 기어(gear) 등의 제품이나 주조 기술에 대해 공학 시뮬레이션 자동화가 시도되었다. KISTI에서는 축류팬(axial fan) 시뮬레이션 자동화에 대해 프로토타입 시스템을 구축하였으며, 현대차에서는 자동차 부품에 대한 시뮬레이션 자동화 시스템을 구축하여 활용하고 있다. 미국 OSC(Ohio Supercomputer Center)의 경우 용접기술에 대한 시뮬레이션 자동화 시스템을 웹상에 구축하여 서비스를 오픈하였으며, 현재 전 세계 200여 기업이 이용하고 있다. 공학 시뮬레이션 자동화 기술이 보다 발전하기 위해서는 시뮬레이션 결과의 신뢰성, 적용 가능 분야 및 제품의 확대, 데이터보안 등이 확보되어야 한다.

  • PDF

A Study on the Scheme to Revitalize the Escrow through the Stabilization of Real Estate Transactions (부동산거래 안정을 위한 에스크로우 활성화 방안에 대한 연구)

  • Kwon, Young-Sik;Park, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.349-356
    • /
    • 2012
  • Entering the era of globalization, international real estate companies to advance into the country are increasing. And real estate transactions, the need for transparency and reliability are becoming even more. The alternative that real estate transactions in advance to avoid an accident is just an escrow system. Analysing the status and actual conditions of escrow in the country's real estate market and presenting the activation plans are as follows. First, the government should support building bulk service for real estate transactions. Second, tax benefits should be developed.

Study on NFC Security Analysis and UICC Alternative Effect (NFC 보안 기술 분석 및 UICC 적용 효과 연구)

  • Lim, Sun-Hee;Jeon, Jae-Woo;Jung, Im-Jin;Yi, Ok-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.29-36
    • /
    • 2011
  • Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.