• 제목/요약/키워드: 정보 메시지

Search Result 3,591, Processing Time 0.026 seconds

The Role of stock market management and social media - Analyzing the types of individual investor and topic - (주식시장관리제도와 소셜 미디어의 역할 - 개인 투자자 집단 유형과 토픽 분석 -)

  • Kim, Jung-Su;Lee, Suk-Jun
    • Management & Information Systems Review
    • /
    • v.34 no.5
    • /
    • pp.23-47
    • /
    • 2015
  • In the Korea stock market, individual investors have perceived stock as short arbitrage investment, not long-term investment strategy. In order to reinforce stock market transparency and soundness, it is important to enforce the measures for stock market management. Especially, stock market event caused by financial policy can be given individual investors negative information regarding a stock trading. Thus, it is a need for investigating whether comprehensive review of listing eligibility is influenced on individual investors' responses and stock behaviors in respect of effectiveness. The purpose of this study to examine the relations between such stock market management and transitional aspect of individual investors' trading types and response on the based of pre- and post-event occurrence. Using an dataset of user's text messages on 9 firms posted on the firm-based social media (i.e., Naver, Daum, Paxnet) over the period 2009 to 2014. And we performed text-clustering and topic modeling according to keywords for classifying into investors group and non-investors groups and two types of investors were categorized depending on main topic transition by event windows in Comprehensive review of listing eligibility. The results indicated that a variety of stockholders existed in the stock. And the ratio of non-investors group was on the decrease, on the other hand, the proportion of investors group veer onto the side of pre-pattern after comprehensive review of listing eligibility. A distinctive feature of our study is to explain the influence of stock market management on response changes of individual investors as well as to categorize in accordance with time progression. Implications an suggestions for future research were also discussed.

  • PDF

Broadcast Encryption System Using Secret Sharing and Subset Difference Methods (비밀분산 기법과 Subset Difference 기법을 이용한 브로드캐스트 암호시스템)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.20 no.1
    • /
    • pp.92-109
    • /
    • 2015
  • Broadcast encryption is a cryptographic primitive that allows a sender to securely broadcast a message to a set of receivers. The most influential broadcast encryption system was proposed in 2001 by Naor, Naor, Lotspiech, based on a pseudo-random generator and the Subset Difference (SD) method. In this paper, we suggest a new broadcast encryption system that is based on secret sharing and SD methods. On an efficiency aspect, our system achieves O(r) transmission cost, O($log^2n$) storage cost, and O(1) computational cost for the number n of users and the number r of revoked users. Compared to O(log n) computational cost in the previous SD method, our system has the advantage that it needs only constant-sized computational cost for decryption, regardless of the number n or r. On a security aspect, our system can achieve tighter security reduction than the previous SD method and the gap of security loss is about O(n log n). Moreover, our result shows that it is possible to give the effect of the SD method while using an information-theoretically secure key distribution technique as in the Complete Subtree method.

Characteristics of Smartphone User in Application Usage and Implications for Applications Business Model (스마트폰 사용자들의 앱 이용 특성과 앱 비즈니스 모델에의 시사)

  • Yun, Hyung Bo;Wang, Boram;Park, Jiyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.32-42
    • /
    • 2013
  • As the smartphone market grows, the needs for its new business model are also increased. However, most previous researches on smartphone applications focused on Technology Acceptance Model(TAM) and Rogers' Diffusion of Innovation Theory so that there was lack of researches on characteristics for actual smartphone users. In this research, we divided the smartphone applications into five category functions (Call & Text/Music & Video/Information Search/Game/Social Network Service (SNS)). We analyzed characteristic differences of users who used the each application category and found that the differences were statistically significant in both demographic and smartphone usage characteristics (frequency of downloading applications, and download experience of paid applications). Additionally, the smartphone usage characteristic is closely related to the usage duration. The representative result is that the characteristics of people used Music & Video function actively were women in their 20s who downloaded applications more than three times per week, and had a download experience of paid applications. It is positive result for players in the application markets, because it means the users are willing to pay for downloading the paid applications. However, large companies already occupied most of the market share in music applications so that small and medium-sized players should develop an innovative and distinguishable business model in order to success. We believe this research result would provide significant implications for the players in planning the successful business model and developing an user-specific application product.

Component Analysis for Constructing an Emotion Ontology (감정 온톨로지의 구축을 위한 구성요소 분석)

  • Yoon, Ae-Sun;Kwon, Hyuk-Chul
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.1
    • /
    • pp.157-175
    • /
    • 2010
  • Understanding dialogue participant's emotion is important as well as decoding the explicit message in human communication. It is well known that non-verbal elements are more suitable for conveying speaker's emotions than verbal elements. Written texts, however, contain a variety of linguistic units that express emotions. This study aims at analyzing components for constructing an emotion ontology, that provides us with numerous applications in Human Language Technology. A majority of the previous work in text-based emotion processing focused on the classification of emotions, the construction of a dictionary describing emotion, and the retrieval of those lexica in texts through keyword spotting and/or syntactic parsing techniques. The retrieved or computed emotions based on that process did not show good results in terms of accuracy. Thus, more sophisticate components analysis is proposed and the linguistic factors are introduced in this study. (1) 5 linguistic types of emotion expressions are differentiated in terms of target (verbal/non-verbal) and the method (expressive/descriptive/iconic). The correlations among them as well as their correlation with the non-verbal expressive type are also determined. This characteristic is expected to guarantees more adaptability to our ontology in multi-modal environments. (2) As emotion-related components, this study proposes 24 emotion types, the 5-scale intensity (-2~+2), and the 3-scale polarity (positive/negative/neutral) which can describe a variety of emotions in more detail and in standardized way. (3) We introduce verbal expression-related components, such as 'experiencer', 'description target', 'description method' and 'linguistic features', which can classify and tag appropriately verbal expressions of emotions. (4) Adopting the linguistic tag sets proposed by ISO and TEI and providing the mapping table between our classification of emotions and Plutchik's, our ontology can be easily employed for multilingual processing.

  • PDF

The Effects of City's Search Keyword Type on Facebook Page Fans and Inbound Tourists : Focusing on Seoul City (도시의 검색키워드 유형이 페이스북 페이지 팬 수 및 관광객 수에 미치는 영향에 관한 연구: 서울시를 중심으로)

  • Choi, Jee-Hye;Lee, Hyo-Bok
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.93-101
    • /
    • 2017
  • This study investigate the effect of each type of search volume on the number of Facebook fans and the number of tourists. According to the hierarchy effect model, the effect of communication appears to be the sequentiality of cognition-attitude-behavior. Applying this theory, this study predicted that when consumers who have higher involvement and knowledge on specific cities through search behavior, they will be more active in information search through Facebook fan page subscription and will lead to direct tourism behavior. To verify the prediction, we examined the influences among search volume of Seoul shown in Google Trend, the number of fans of official facebook page named 'Seoul Korea', and the number of foreign tourists. As a result, the type of search keyword was divided into four categories: tourism attraction keyword, natural environment keyword, symbolic keyword, and accessibility keyword. The regression analysis showed that tourism attraction keyword and symbolic keyword have influence on Facebook fanpage 'Like'. In addition, facebook fanpage fan size have mediation effect between search volume and number of tourists. All in all, it would be useful to appeal to foreign tourists with a message that emphasizes tourism attraction and Korea-related contents.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

An Enhanced Greedy Message Forwarding Protocol for High Mobile Inter-vehicular Communications (고속으로 이동하는 차량간 통신에서 향상된 탐욕 메시지 포워딩 프로토콜)

  • Jang, Hyun-Hee;Yu, Suk-Dae;Park, Jae-Bok;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.3
    • /
    • pp.48-58
    • /
    • 2009
  • Geo-graphical routing protocols as GPSR are known to be very suitable and useful for vehicular ad-hoc networks. However, a corresponding node can include some stale neighbor nodes being out of a transmission range, and the stale nodes are pone to get a high priority to be a next relay node in the greedy mode. In addition, some useful redundant information can be eliminated during planarization in the recovery mode. This paper deals with a new recovery mode, the Greedy Border Superiority Routing(GBSR), along with an Adaptive Neighbor list Management(ANM) scheme. Each node can easily treat stale nodes on its neighbor list by means of comparing previous and current Position of a neighbor. When a node meets the local maximum, it makes use of a border superior graph to recover from it. This approach improve the packet delivery ratio while it decreases the time to recover from the local maximum. We evaluate the performance of the proposed methods using a network simulator. The results shown that the proposed protocol reveals much better performance than GPSR protocol. Please Put the of paper here.

Cluster-Based Routing Mechanism for Efficient Data Delivery to Group Mobile Users in Wireless Ad-Hoc Networks (그룹 이동성을 가지는 모바일 사용자들 간의 효율적인 데이터 공유를 위한 클러스터 기반 그룹 라우팅 기법 메커니즘)

  • Yoo, Jinhee;Han, Kyeongah;Jeong, Dahee;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1060-1073
    • /
    • 2013
  • In this paper, we present a cluster-based routing scheme for efficiently delivering data to group mobile users by extracting and clustering mobile user group simply from beacon message information in wireless ad-hoc networks. First, we propose an online-clustering mechanism that uses a local neighbor table on each node by recursively transmitting to neighbor nodes, and forms a group table where a set of listed nodes are classified as group members, without incurring much overhead. A node that appears the most frequently from neighbor tables throughout the network is selected as the cluster-head node, serving as a data gateway for the intra-cluster. Second, we design an inter-cluster routing that delivers data from stationary data sources to the selected cluster-head node, and a intra-cluster routing to deliver from the cluster-head node to users. Simulation results based on ns-2 in the ad-hoc networks consisting of 518 stationary nodes and 20 mobile nodes show that our proposed clustering mechanism achieves high clustering accuracy of 96 % on average. Regarding routing performance, our cluster-based routing scheme outperforms a naive one-to-one routing scheme without any clustering by reducing routing cost up to 1/20. Also, our intra-cluster routing utilizing a selected cluster-head node reduces routing cost in half as opposed to a counterpart of the intra-cluster routing through a randomly-selected internal group member.

A Matchmaking System Adjusting the Mate-Selection Criteria based on a User's Behaviors using the Decision Tree (고객의 암묵적 이상형을 반영하여 배우자 선택기준을 동적으로 조정하는 온라인 매칭 시스템: 의사결정나무의 활용을 중심으로)

  • Park, Yoon-Joo
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.115-129
    • /
    • 2012
  • A matchmaking system is a type of recommender systems that provides a set of dating partners suitable for the user by online. Many matchmaking systems, which are widely used these days, require users to specify their preferences with regards to ideal dating partners based on criteria such as age, job and salary. However, some users are not aware of their exact preferences, or are reluctant to reveal this information even if they do know. Also, users' selection standards are not fixed and can change according to circumstances. This paper suggests a new matchmaking system called Decision Tree based Matchmaking System (DTMS) that automatically adjusts the stated standards of a user by analyzing the characteristics of the people the user chose to contact. AMMS provides recommendations for new users on the basis of their explicit preferences. However, as a user's behavioral records are accumulated, it begins to analyze their hidden implicit preferences using a decision tree technique. Subsequently, DTMS reflects these implicit preferences in proportion to their predictive accuracy. The DTMS is regularly updated when a user's data size increases by a set amount. This paper suggests an architecture for the DTMS and presents the results of the implementation of a prototype.

  • PDF

Bit Assignment for Wyner-Ziv Video Coding (Wyner-Ziv 비디오 부호화를 위한 비트배정)

  • Park, Jong-Bin;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.128-138
    • /
    • 2010
  • In this paper, we propose a new bit assignment scheme for Wyner-Ziv video coding. Distributed video coding (DVC) is a new video coding paradigm which enables greatly low complexity encoding because it does not have any motion prediction module at encoder. Therefore, it is very well suited for many applications such as video communication, video surveillance, extremely low power consumption video coding, and other portable applications. Theoretically, the Wyner-Ziv video coding is proved to achieve the same rate-distortion (RD) performance comparable to that of the joint video coding. However, its RD performance has much gap compared to MC-DCT-based video coding such as H.264/AVC. Moreover, Transform Domain Wyner-Ziv (TDWZ) video coding which is a kind of DVC with transform module has difficulty of exact bit assignment because the entire image is treated as a same message. In this paper, we propose a feasible bit assignment algorithm using adaptive quantization matrix selection for the TDWZ video coding. The proposed method can calculate suitable bit amount for each region using the local characteristics of image. Simulation results show that the proposed method can enhance coding performance.