• Title/Summary/Keyword: 등급분류방식

Search Result 43, Processing Time 0.025 seconds

A study on an evaluation system by factor loadings (요인적재값 가중치를 사용한 평가 시스템에 대한 연구)

  • Lee, Kee-Won;Sim, Songyong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.5
    • /
    • pp.1285-1291
    • /
    • 2016
  • To quantify an concept we often use Likert summated rating scale of original or standardized variables in case the variables are relatively less. When variables have different scales, standardized values tends to be used rather than the original values. This is also true in evaluating systems. For example, we may use standardized values of local tax levy, population, and etc. and use the summed value of the standardized values to access the degrees of development. In this paper, we propose using a data-driven weighted sum for a scoring system and the way how to obtain the weights. We apply the proposed method to a real data set and find that proposed method is better than the usual summated rating scale.

Concurrency Control with Dynamic Adjustment of Serialization Order in Multilevel Secure DBMS (다단계 보안 데이타베이스에서 직렬화 순서의 동적 재조정을 사용한 병행수행 제어 기법)

  • Kim, Myung-Eun;Park, Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.15-28
    • /
    • 1999
  • In Multilevel Secure Database Management System(MLS/DBMS), we assume that system has a security clearance level for each user and a classification level for each data item in system and the objective of these systems is to protect secure information from unauthorized user. Many algorithms which have been researched have focus on removing covert channel by modifying conventional lock-based algorithm or timestamp-based algorithm. but there is high-level starvation problem that high level transaction is aborted by low level transaction repeatedly. In order to solve this problem, we propose an algorithm to reduce high-level starvation using dynamic adjustment of serialization order, which is basically using orange lock. Because our algorithm is based on a single version unlike conventional secure algorithms which are performed on multiversion, it can get high degree of concurrency control. we also show that it guarantees the serializability of concurrent execution, and satisfies secure properties of MLS/DBMS.

A Study on Predicting Credit Ratings of Korean Companies using TabNet

  • Hyeokjin Choi;Gyeongho Jung;Hyunchul Ahn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.11-20
    • /
    • 2024
  • This study presents TabNet, a novel deep learning method, to enhance corporate credit rating accuracy amidst growing financial market uncertainties due to technological advancements. By analyzing data from major Korean stock markets, the research constructs a credit rating prediction model using TabNet. Comparing it with traditional machine learning, TabNet proves superior, achieving a Precision of 0.884 and an F1 score of 0.895. It notably reduces misclassification of high-risk companies as low-risk, emphasizing its potential as a vital tool for financial institutions in credit risk management and decision-making.

The Relationship between Bone Bruise in MR-Imaging and the Degrees of Acute Anterior Cruciate Ligament Injury (급성 전방십자인대 손상 시 자기공명영상에서 나타나는 골멍과 전방십자인대 손상 정도의 관계)

  • Jeong, Hwa-Jae;Shin, Hun-Kyu;Ko, Chun-Suk;Kim, Jang-Hwan
    • Journal of the Korean Arthroscopy Society
    • /
    • v.16 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • Purpose: The aim of this retrospective study was to evaluate the relationship between appearance and size of bone bruise and severity of anterior cruciate ligament (ACL) injury with magnetic resonance imaging (MRI), furthermore, to identify the mechanism of ACL injury by analyzing the footprint of bone bruise. Materials and Methods: Sixty-five subjects who was taken an MRI within 6 weeks after acute ACL injury were studied. All MRI showed ACL injury and associated bone bruises. Bone bruises were analyzed using Costa-Paz classification based on appearance and location and also scored using Kornaat bone bruise grading system based on size and location. The severity of the ACL injury was graded using a 4-point system (ie, grade 0-3) with oblique coronal MRI. Results: There was statistically significant correlation between Costa-Paz classification of bone bruises in lateral femoral condyle and grade of ACL injury. There were more type 2 lesions in partial tear group (grade 1, 2), however, type 3 lesions of Costa-Paz classification in complete tear group (P=0.037). Significant positive correlations were observed between Kornaat total bone bruise score and grade of ACL injury (P=0.014). Most common ACL injury mechanism was pivot shift injury. Other mechanisms were clip valgus injury, phantom foot injury, and hyperextension injury. Conclusion: It is highly suggested that appearance and size of bone bruise is related to severity of ACL injury after acute ACL injury. The foot print of bone bruise provides valuable clues to identify ACL injury mechanism.

  • PDF

Incentives to Manage Operating Cash Flows Among Listed Companies in Korea (한국 상장기업의 영업현금흐름 조정 동기)

  • Choi, Jong-Seo
    • Management & Information Systems Review
    • /
    • v.34 no.5
    • /
    • pp.213-231
    • /
    • 2015
  • In this paper, I examine whether the listed companies in Korea tend to manage operating cash flows upward via classification shifting after the adoption of K-IFRS. As proxies for cash flow management, I derive a measure of abnormal operating cash flows borrowing from Lee(2012). Alternative proxies include a series of categorical variables designed to identify the types of classification shifting of interest and dividend payments among others, in the statement of cash flows. Higher level of estimated abnormal operating cash flows, and the classification of interest/dividend payments in non-operating activity sections are considered to indicate the managerial intention to maximize reported operating cash flows. I consider several potential incentives to manage operating cash flows, which include financial distress, the credit rating proximity to investment/non-investment cutoff threshold, avoidance of negative or decreasing operating cash flows relative to previous period and so forth. In a series of empirical analyses, I do not find evidence in support of the opportunistic classification shifting explanation, inconsistent with several previous literature in Korea. In contrast, I observe negative associations between the CFO management proxies and selected incentives, which suggest that the classification is likely to represent above average cash flow performance rather than opportunistic motives exercised to maximize reported operating cash flows. I reckon that this observation is, in part, driven by the K-IFRS requirement to maintain temporal consistency in classifying interest and dividend receipts/payments in cash flow statement.

  • PDF

A Web application vulnerability scoring framework by categorizing vulnerabilities according to privilege acquisition (취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크)

  • Cho, Sung-Young;Yoo, Su-Yeon;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.601-613
    • /
    • 2012
  • It is required to design and implement secure web applications to provide safe web services. For this reason, there are several scoring frameworks to measure vulnerabilities in web applications. However, these frameworks do not classify according to seriousness of vulnerability because these frameworks simply accumulate score of individual factors in a vulnerability. We rate and score vulnerabilities according to probability of privilege acquisition so that we can prioritize vulnerabilities found in web applications. Also, our proposed framework provides a method to score all web applications provided by an organization so that which web applications is the worst secure and should be treated first. Our scoring framework is applied to the data which lists vulnerabilities in web applications found by a web scanner based on crawling, and we show the importance of categorizing vulnerabilities according to privilege acquisition.

Conservation Status, Construction Type and Stability Considerations for Fortress Wall in Hongjuupseong (Town Wall) of Hongseong, Korea (홍성 홍주읍성 성벽의 보존상태 및 축성유형과 안정성 고찰)

  • Park, Junhyoung;Lee, Chanhee
    • Korean Journal of Heritage: History & Science
    • /
    • v.51 no.3
    • /
    • pp.4-31
    • /
    • 2018
  • It is difficult to ascertain exactly when the Hongjuupseong (Town Wall) was first constructed, due to it had undergone several times of repair and maintenance works since it was piled up newly in 1415, when the first year of the reign of King Munjong (the 5th King of the Joseon Dynasty). Parts of its walls were demolished during the Japanese occupation, leaving the wall as it is today. Hongseong region is also susceptible to historical earthquakes for geological reasons. There have been records of earthquakes, such as the ones in 1978 and 1979 having magnitudes of 5.0 and 4.0, respectively, which left part of the walls collapsed. Again, in 2010, heavy rainfall destroyed another part of the wall. The fortress walls of the Hongjuupseong comprise various rocks, types of facing, building methods, and filling materials, according to sections. Moreover, the remaining wall parts were reused in repair works, and characteristics of each period are reflected vertically in the wall. Therefore, based on the vertical distribution of the walls, the Hongjuupseong was divided into type I, type II, and type III, according to building types. The walls consist mainly of coarse-grained granites, but, clearly different types of rocks were used for varying types of walls. The bottom of the wall shows a mixed variety of rocks and natural and split stones, whereas the center is made up mostly of coarse-grained granites. For repairs, pink feldspar granites was used, but it was different from the rock variety utilized for Suguji and Joyangmun Gate. Deterioration types to the wall can be categorized into bulging, protrusion of stones, missing stones at the basement, separation of framework, fissure and fragmentation, basement instability, and structural deformation. Manually and light-wave measurements were used to check the amount and direction of behavior of the fortress walls. A manual measurement revealed the sections that were undergoing structural deformation. Compared with the result of the light-wave measurement, the two monitoring methods proved correlational. As a result, the two measuring methods can be used complementarily for the long-term conservation and management of the wall. Additionally, the measurement system must be maintained, managed, and improved for the stability of the Hongjuupseong. The measurement of Nammunji indicated continuing changes in behavior due to collapse and rainfall. It can be greatly presumed that accumulated changes over the long period reached the threshold due to concentrated rainfall and subsequent behavioral irregularities, leading to the walls' collapse. Based on the findings, suggestions of the six grades of management from 0 to 5 have been made, to manage the Hongjuupseong more effectively. The applied suggested grade system of 501.9 m (61.10%) was assessed to grade 1, 29.5 m (3.77%) to grade 2, 10.4 m (1.33%) to grade 3, 241.2 m (30.80%) and grade 4. The sections with grade 4 concentrated around the west of Honghwamun Gate and the east of the battlement, which must be monitored regularly in preparation for a potential emergency. The six-staged management grade system is cyclical, where after performing repair and maintenance works through a comprehensive stability review, the section returned to grade 0. It is necessary to monitor thoroughly and evaluate grades on a regular basis.

Study on Security Grade Classification of Financial Company Documents (금융기관 문서 보안등급 분류에 관한 연구)

  • Kang, Bu Il;Kim, Seung Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1319-1328
    • /
    • 2014
  • While the recent advance in network system has made it easier to collect and process personal information, the loss of customers, financial companies and even nations is getting bigger due to the leakage of personal information. Therefore, it is required to take a measure to prevent additional damage from the illegal use of leakaged personal information. Currently, financial companies use access control in accordance with job title or position on general documents as well as important documents including personal information. Therefore, even if a documents is confidential, it is possible for a person of the same job title or position to access the document properly. This paper propose setting up security grade of documents to improve current access control system. It will help preventing the leakage of personal information.

Grading System of Movie Review through the Use of An Appraisal Dictionary and Computation of Semantic Segments (감정어휘 평가사전과 의미마디 연산을 이용한 영화평 등급화 시스템)

  • Ko, Min-Su;Shin, Hyo-Pil
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.4
    • /
    • pp.669-696
    • /
    • 2010
  • Assuming that the whole meaning of a document is a composition of the meanings of each part, this paper proposes to study the automatic grading of movie reviews which contain sentimental expressions. This will be accomplished by calculating the values of semantic segments and performing data classification for each review. The ARSSA(The Automatic Rating System for Sentiment analysis using an Appraisal dictionary) system is an effort to model decision making processes in a manner similar to that of the human mind. This aims to resolve the discontinuity between the numerical ranking and textual rationalization present in the binary structure of the current review rating system: {rate: review}. This model can be realized by performing analysis on the abstract menas extracted from each review. The performance of this system was experimentally calculated by performing a 10-fold Cross-Validation test of 1000 reviews obtained from the Naver Movie site. The system achieved an 85% F1 Score when compared to predefined values using a predefined appraisal dictionary.

  • PDF

GIS-based Subsidence Hazard Map in Urban Area (GIS 기반의 도심지 지반침하지도 작성 사례)

  • Choi, Eun-Kyeong;Kim, Sung-Wook;Cho, Jin-Woo;Lee, Ju-Hyung
    • Journal of the Korean Geotechnical Society
    • /
    • v.33 no.10
    • /
    • pp.5-14
    • /
    • 2017
  • The hazard maps for predicting collapse on natural slopes consist of a combination of topographic, hydrological, and geological factors. Topographic factors are extracted from DEM, including aspect, slope, curvature, and topographic index. Hydrological factors, such as soil drainage, stream-power index, and wetness index are most important factors for slope instability. However, most of the urban areas are located on the plains and it is difficult to apply the hazard map using the topography and hydrological factors. In order to evaluate the risk of subsidence of flat and low slope areas, soil depth and groundwater level data were collected and used as a factor for interpretation. In addition, the reliability of the hazard map was compared with the disaster history of the study area (Gangnam-gu and Yeouido district). In the disaster map of the disaster prevention agency, the urban area was mostly classified as the stable area and did not reflect the collapse history. Soil depth, drainage conditions and groundwater level obtained from boreholes were added as input data of hazard map, and disaster vulnerability increased at the location where the actual subsidence points. In the study area where damage occurred, the moderate and low grades of the vulnerability of previous hazard map were 12% and 88%, respectively. While, the improved map showed 2% high grade, moderate grade 29%, low grade 66% and very low grade 2%. These results were similar to actual damage.