• Title/Summary/Keyword: 행위기법

Search Result 771, Processing Time 0.021 seconds

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

Design and Implementation of Hashtag Recommendation System Based on Image Label Extraction using Deep Learning (딥러닝을 이용한 이미지 레이블 추출 기반 해시태그 추천 시스템 설계 및 구현)

  • Kim, Seon-Min;Cho, Dae-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.709-716
    • /
    • 2020
  • In social media, when posting a post, tag information of an image is generally used because the search is mainly performed using a tag. Users want to expose the post to many people by attaching the tag to the post. Also, the user has trouble posting the tag to be tagged along with the post, and posts that have not been tagged are also posted. In this paper, we propose a method to find an image similar to the input image, extract the label attached to the image, find the posts on instagram, where the label exists as a tag, and recommend other tags in the post. In the proposed method, the label is extracted from the image through the model of the convolutional neural network (CNN) deep learning technique, and the instagram is crawled with the extracted label to sort and recommended tags other than the label. We can see that it is easy to post an image using the recommended tag, increase the exposure of the search, and derive high accuracy due to fewer search errors.

Analysis of Geomorphological Changes using RS and GIS techniques in Shinduri coastal dunefield (원격탐사와 GIS 기법을 이용한 신두리 해안사구지대의 지형변화 분석)

  • Seo, Jong-Cheol
    • Journal of the Korean association of regional geographers
    • /
    • v.8 no.1
    • /
    • pp.98-109
    • /
    • 2002
  • The long term land-cover changes and the pattern of morphological changes in foredune ridges and unvegetated dunes were investigated for about 30 years through analysing aerial photographs in Shinduri coastal dunefield, Korea. As a result, forested dune area increased while unvegetated dune area decreased continuously since 1967. Foredune ridges retreated landward about 80m away from the former coast-line in the middle part while they advanced seaward after construction of dike in the northern part during last 3 decades. Unvegetated dunes in the middle part of the dunefield were eroded at seaward side and moved landward away. These facts mean not only coastal dune area has been affected by man-made effects such as afforestation and coastal developments but also shinduri coastal dune area has been stabilized by plants and has been negative sediment budget.

  • PDF

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

A Case Study on Mobile Advertisement Injection (모바일 광고 인젝션 사례 연구)

  • Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1049-1058
    • /
    • 2017
  • The rapid evolution of mobile technologies and proliferation of mobile devices have created a new channel for marketing by mobile advertising. As mobile advertising is a close relative to online advertising, it also has similar problems such as advertisement injections (Ad injections). Users are exposed to unwanted advertisements and redundant web traffic by injected ads can cause additional charges of mobile devices. Although mobile ad injection can cause many problems it has been merely studied. In this paper, we analyze ad injection activities by mobile applications that exploit a legitimate application (Naver mobile application). We reverse-engineered 2 mobile applications and find out characteristics of mobile ad injections. We compare mobile ad injections with online ad injections and suggest feasible mitigations.

On the SimFlex Language Constructs for Object-Based Software Process Programming (객체기반 소프트웨어 프로세스 프로그래밍을 위한 SimFlex 언어의 구조)

  • Kim, Young-Gon;Lee, Myung-Joon;Kang, Byeong-Do
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2756-2768
    • /
    • 1997
  • The software Process can be defined as the set of activities, rules, procedures, techniques and tools used within the production of software. A software process model is a conceptual representation of a real world software Process and can be described by process programming languages. In this paper, we present the language constructs of SimFlex designed for object-based software process programming. The design of SimFlex is based on the object concept, so that it can model complex software processes concisely both in syntax and semantics. Since the language constructs of SimFlex are derived from the analysis of major PSEEs and their associated process programming languages, SimFlex includes the core characteristics required for a desirable object-based process programming language. In addition, SimFlex is designed to act as a template software process definition language which could be included in specific PSEEs through customization appropriate to those PSEEs.

  • PDF

Improvement of Railway Demand Forecasting Methodology under the Various Transit Fare Systems of Seoul Metropolitan Area (Focused on Mode Share) (수도권 대중교통 요금제의 다양화에 따른 철도 수요예측 방법론의 개선(수단분담을 중심으로))

  • Choe, Gi-Ju;Lee, Gyu-Jin;Ryu, In-Gon
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.2
    • /
    • pp.171-181
    • /
    • 2010
  • The integrated transit fare system of Seoul metropolitan area has given positively evaluated with reduction of user cost and activating the transfer behavior from its opening year, July 2007. However, there were only few research about railway demand forecasting methodology, especially mode share, has conducted under the integrated fare system. This study focuses on the utility estimation by each mode under the integrated fare system, and on the coefficient actualization relates on travel time and travel cost estimation with Household Travel Survey Data 2006. Also the railway demand analysis methodology under various fare systems is presented. The methodology from this study is expected to improve accuracy and usefulness in railway demand analysis.

Cognitive Approach for Building Intelligent Agent (지능 에이전트 구현의 인지적 접근)

  • Tae Kang-Soo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.97-105
    • /
    • 2004
  • The reason that an intelligent agent cannot understand the representation of its own perception or activity is caused by the traditional syntactic approach that translates a semantic feature into a simulated string, To implement an autonomously learning intelligent agent, Cohen introduces a experimentally semantic approach that the system learns a contentful representation of physical schema from physically interacting with environment using its own sensors and effectors. We propose that negation is a meta-level schema that enables an agent to recognize its own physical schema, To improve the planner's efficiency, Graphplan introduces the control rule that manipulates the inconsistency between planning operators, but it cannot cognitively understand negation and suffers from redundancy problem. By introducing a negative function not, IPP solves the problem, but its approach is still syntactic and is inefficient in terms of time and space. In this paper, we propose that, to represent a negative fact, a positive atom, which is called opposite concept, is a very efficient technique for implementing an cognitive agent, and demonstrate some empirical results supporting the hypothesis.

  • PDF

Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile (모바일 상에서 비트율이 낮은 비디오 콘텐츠의 강인성을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.

Machine Learning in Media Industry :Focusing on Content Value Evaluation and Production Development (기계학습의 미디어 산업 적용 :콘텐츠 평가 및 제작 자원을 중심으로)

  • Kwon, Shin-Hye;Park, Kyung-Woo;Chang, Byeng-Chul;Chang, Byeng-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.526-537
    • /
    • 2019
  • This study researched the effect of application systems for media industry by using machine learning method focusing on industrial organization theory. First, for applying the system successfully, formation of sympathy about needs is required. The introduction of machine learning can bring change in each stage of value chain especially, decision making process of investment and production process. In investment side, objective performance prediction data can enhance efficiency, and content diversity can decrease with concentrated investment phenomenon to secured content by the system. In production side, if the system support to make creators decrease simple repeat works, production efficiency will increase.