• Title/Summary/Keyword: 비정형데이터

Search Result 589, Processing Time 0.033 seconds

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.

Irregular Bigdata Analysis and Considerations for Civil Complaint Based on Design Thinking (비정형 빅데이터 분석 및 디자인씽킹을 활용한 민원문제 해결에 대한 고찰)

  • Kim, Tae-Hyung;Park, Byung-Jae;Suh, Eung-Kyo
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.8
    • /
    • pp.51-60
    • /
    • 2018
  • Purpose - Civil affairs are increasing in various forms, but civil servants who are able to handle them want to reduce the complaints and provide keywords that will help in the future due to their lack of time. While various ideas are presented and implemented as policies in solving civil affairs, there are many cases that are not policies that people can sympathize with. Therefore, it is necessary to analyze the complaints accurately and to present correct solutions to the analyzed civil complaint data. Research design, data, and methodology - We analyzed the complaints data for the last three years and found out how to solve the problems of Yongin City and alleviate the burdens of civil servants. To do this, the Hadoop platform and Design Thinking process were reviewed, and proposed a new process to fuse it. The big data analysis stage focuses on civil complaints - Civil data extraction - Civil data analysis - Categorization of the year by keywords analyzing them and the needs of citizens were identified. In the forecast analysis for deriving insights, - The case of innovation case study - Idea derivation - Idea evaluation - Prototyping - Case analysis stage used. Results - Through this, a creative idea of providing free transportation cards to solve the major issues of construction, apartment, installation, and vehicle problems was discovered. There is a specific problem of how to provide these services to certain areas, but there is a pressing need for a policy that can contribute as much as it can to the citizens who are suffering from various problems at this moment. Conclusions - In the past, there were many cases in which free traffic cards were issued mainly to the elderly or disabled. In other countries, foreign residents of other area visit the areas for accommodation, and may give out free transportation cards as well. In this case, the local government will be able to set up a framework to present with a win-win scenario in various ways. It is necessary to reorganize the process in future studies so that the actual solution will be adopted, reduce civil complaints, help establish policies in the future, and be applied in other cities as well.

Visualizing Spatial Information of Climate Change Impacts on Social Infrastructure using Text-Mining Method (텍스트마이닝 기법을 활용한 사회기반시설 기후변화 영향의 공간정보 표출)

  • Shin, Hana;Ryu, Jaena
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_3
    • /
    • pp.773-786
    • /
    • 2017
  • This study was to analyze data of climate change impacts on social infrastructure using text-mining methodology, and to visualize the spatial information by integrating those with regional data layers. First of all, the study identified that the following social infrastructure; power, oil and resource management, transport and urban, environment, and water supply infrastructures, were affected by five kinds of climate factors (heat wave, cold wave, heavy rain, heavy snow, strong wind). Climate change impacts on social infrastructure were then analyzed and visualized by regions. The analysis resulted that transport and urban infrastructures among all kinds of infrastructure were highly impacted by climate change, and the most severe factors of the climate impacts on social infrastructure were heavy rain and heavy snow. In addition, it found out that social infrastructure located in Seoul and Gangwon-do region were relatively largely affected by climate change. This study has significance that atypical data in media was used to analyze climate change impacts on social infrastructure and the results were translated into spatial information data to analyze and visualize the climate change impacts by regions.

A Study on the Integration of Information Extraction Technology for Detecting Scientific Core Entities based on Large Resources (대용량 자원 기반 과학기술 핵심개체 탐지를 위한 정보추출기술 통합에 관한 연구)

  • Choi, Yun-Soo;Cheong, Chang-Hoo;Choi, Sung-Pil;You, Beom-Jong;Kim, Jae-Hoon
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.1-22
    • /
    • 2009
  • Large-scaled information extraction plays an important role in advanced information retrieval as well as question answering and summarization. Information extraction can be defined as a process of converting unstructured documents into formalized, tabular information, which consists of named-entity recognition, terminology extraction, coreference resolution and relation extraction. Since all the elementary technologies have been studied independently so far, it is not trivial to integrate all the necessary processes of information extraction due to the diversity of their input/output formation approaches and operating environments. As a result, it is difficult to handle scientific documents to extract both named-entities and technical terms at once. In this study, we define scientific as a set of 10 types of named entities and technical terminologies in a biomedical domain. in order to automatically extract these entities from scientific documents at once, we develop a framework for scientific core entity extraction which embraces all the pivotal language processors, named-entity recognizer, co-reference resolver and terminology extractor. Each module of the integrated system has been evaluated with various corpus as well as KEEC 2009. The system will be utilized for various information service areas such as information retrieval, question-answering(Q&A), document indexing, dictionary construction, and so on.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

A Performance Improvement of Linux TCP/IP Stack based on Flow-Level Parallelism in a Multi-Core System (멀티코어 시스템에서 흐름 수준 병렬처리에 기반한 리눅스 TCP/IP 스택의 성능 개선)

  • Kwon, Hui-Ung;Jung, Hyung-Jin;Kwak, Hu-Keun;Kim, Young-Jong;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.113-124
    • /
    • 2009
  • With increasing multicore system, much effort has been put on the performance improvement of its application. Because multicore system has multiple processing devices in one system, its processing power increases compared to the single core system. However in many cases the advantages of multicore can not be exploited fully because the existing software and hardware were designed to be suitable for single core. When the existing software runs on multicore, its performance improvement is limited by the bottleneck of sharing resources and the inefficient use of cache memory on multicore. Therefore, according as the number of core increases, it doesn't show performance improvement and shows performance drop in the worst case. In this paper we propose a method of performance improvement of multicore system by applying Flow-Level Parallelism to the existing TCP/IP network application and operating system. The proposed method sets up the execution environment so that each core unit operates independently as much as possible in network application, TCP/IP stack on operating system, device driver, and network interface. Moreover it distributes network traffics to each core unit through L2 switch. The proposed method allows to minimize the sharing of application data, data structure, socket, device driver, and network interface between each core. Also it allows to minimize the competition among cores to take resources and increase the hit ratio of cache. We implemented the proposed methods with 8 core system and performed experiment. Experimental results show that network access speed and bandwidth increase linearly according to the number of core.

Usability Evaluation of Artificial Intelligence Search Services Using the Naver App (인공지능 검색 서비스 활용에 따른 서비스 사용성 평가: 네이버 앱을 중심으로)

  • Hwang, Shin Hee;Ju, Da Young
    • Science of Emotion and Sensibility
    • /
    • v.22 no.2
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, artificial intelligence (AI) has become one of the core technologies in terms of the business strategy among information technology companies. Both international and domestic major portal companies are launching AI search services. These AI search services utilize voice, images, and other unstructured data to provide different experiences from existing text-based search services. An unfamiliar experience is a factor that can hinder the usability of the service. Therefore, the usability testing of the AI search services is necessary. This study examines the usability of the AI search service on the Naver App 8.9.3 beta version by comparing it with the search services of the current Naver App and targets 30 people in their 20s and 30s, who have experience using Naver apps. The usability of Smart Lens, Smart Voice, Smart Around, and AiRS, which are the Naver App beta versions of their artificial intelligence search service, is evaluated and statistically significant usability changes are revealed. Smart Lens, Smart Voice, and Smart Around exhibited positive changes, whereas AiRS exhibited negative changes in terms of usability. This study evaluates the change in usability according to the application of the artificial intelligence search services and investigates the correlation between the evaluation factors. The obtained data are expected to be useful for the usability evaluation of services that use AI.

Deep Learning Based Rescue Requesters Detection Algorithm for Physical Security in Disaster Sites (재난 현장 물리적 보안을 위한 딥러닝 기반 요구조자 탐지 알고리즘)

  • Kim, Da-hyeon;Park, Man-bok;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.57-64
    • /
    • 2022
  • If the inside of a building collapses due to a disaster such as fire, collapse, or natural disaster, the physical security inside the building is likely to become ineffective. Here, physical security is needed to minimize the human casualties and physical damages in the collapsed building. Therefore, this paper proposes an algorithm to minimize the damage in a disaster situation by fusing existing research that detects obstacles and collapsed areas in the building and a deep learning-based object detection algorithm that minimizes human casualties. The existing research uses a single camera to determine whether the corridor environment in which the robot is currently located has collapsed and detects obstacles that interfere with the search and rescue operation. Here, objects inside the collapsed building have irregular shapes due to the debris or collapse of the building, and they are classified and detected as obstacles. We also propose a method to detect rescue requesters-the most important resource in the disaster situation-and minimize human casualties. To this end, we collected open-source disaster images and image data of disaster situations and calculated the accuracy of detecting rescue requesters in disaster situations through various deep learning-based object detection algorithms. In this study, as a result of analyzing the algorithms that detect rescue requesters in disaster situations, we have found that the YOLOv4 algorithm has an accuracy of 0.94, proving that it is most suitable for use in actual disaster situations. This paper will be helpful for performing efficient search and rescue in disaster situations and achieving a high level of physical security, even in collapsed buildings.

The Effect of Engineering Design Based Ocean Clean Up Lesson on STEAM Attitude and Creative Engineering Problem Solving Propensity (공학설계기반 오션클린업(Ocean Clean-up) 수업이 STEAM태도와 창의공학적 문제해결성향에 미치는 효과)

  • DongYoung Lee;Hyojin Yi;Younkyeong Nam
    • Journal of the Korean earth science society
    • /
    • v.44 no.1
    • /
    • pp.79-89
    • /
    • 2023
  • The purpose of this study was to investigate the effects of engineering design-based ocean cleanup classes on STEAM attitudes and creative engineering problem-solving dispositions. Furthermore, during this process, we tried to determine interesting points that students encountered in engineering design-based classes. For this study, a science class with six lessons based on engineering design was developed and reviewed by a professor who majored in engineering design, along with five engineering design experts with a master's degree or higher. The subject of the class was selected as the design and implementation of scientific and engineering measures to reduce marine pollution based on the method implemented in an actual Ocean Clean-up Project. The engineering design process utilized the engineering design model presented by NGSS (2013), and was configured to experience redesign through the optimization process. To verify effectiveness, the STEAM attitude questionnaire developed by Park et al. (2019) and the creative engineering problemsolving propensity test tool developed by Kang and Nam (2016) were used. A pre and post t-test was used for statistical analysis for the effectiveness test. In addition, the contents of interesting points experienced by the learners were transcribed after receiving descriptive responses, and were analyzed and visualized through degree centrality analysis. Results confirmed that engineering design in science classes had a positive effect on both STEAM attitude and creative engineering problem-solving disposition (p< .05). In addition, as a result of unstructured data analysis, science and engineering knowledge, engineering experience, and cooperation and collaboration appeared as factors in which learners were interested in learning, confirming that engineering experience was the main factor.

Comparative analysis of informationattributes inchemical accident response systems through Unstructured Data: Spotlighting on the OECD Guidelines for Chemical Accident Prevention, Preparedness, and Response (비정형 데이터를 이용한 화학물질 사고 대응 체계 정보속성 비교 분석 : 화학사고 예방, 대비 및 대응을 위한 OECD 지침서를 중심으로)

  • YongJin Kim;Chunghyun Do
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.91-110
    • /
    • 2023
  • The importance of manuals is emphasized because chemical accidents require swift response and recovery, and often result in environmental pollution and casualties. In this regard, the OECD revised OECD Guidelines for the Prevention, Preparedness, and Response to Chemical Accidents (referred to as the OECD Guidelines), in June 2023. Moreover, while existing research primarily raises awareness about chemical accidents, highlighting the need for a system-wide response including laws, regulations, and manuals, it was difficult to find comparative research on the attributes of manuals. So, this paper aims to compare and analyze the second and third editions of the OECD Guidelines, in order to uncover the information attributes and implications of the revised version. Specifically, TF-IDF (Term Frequency-Inverse Document Frequency) was applied to understand which keywords have become more important, and Word2Vec was applied to identify keywords that were used similarly and those that were differentiated. Lastly, a 2×2 matrix was proposed, identifying the topics within each quadrant to provide a deeper comparison of the information attributes of the OECD Guidelines. This study offers a framework to help researchers understand information attributes. From a practical perspective, it appears valuable for the revision of standard manuals by domestic government agencies and corporations related to chemistry.