• Title/Summary/Keyword: Account Information

Search Result 2,568, Processing Time 0.028 seconds

Comparison of EM with Jackknife Standard Errors and Multiple Imputation Standard Errors

  • Kang, Shin-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.4
    • /
    • pp.1079-1086
    • /
    • 2005
  • Most discussions of single imputation methods and the EM algorithm concern point estimation of population quantities with missing values. A second concern is how to get standard errors of the point estimates obtained from the filled-in data by single imputation methods and EM algorithm. Now we focus on how to estimate standard errors with incorporating the additional uncertainty due to nonresponse. There are some approaches to account for the additional uncertainty. The general two possible approaches are considered. One is the jackknife method of resampling methods. The other is multiple imputation(MI). These two approaches are reviewed and compared through simulation studies.

  • PDF

Estimation for misclassified data with ultra-high levels

  • Kang, Moonsu
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.1
    • /
    • pp.217-223
    • /
    • 2016
  • Outcome misclassification is widespread in classification problems, but methods to account for it are rarely used. In this paper, the problem of inference with misclassified multinomial logit data with a large number of multinomial parameters is addressed. We have had a significant swell of interest in the development of novel methods to infer misclassified data. One simulation study is shown regarding how seriously misclassification issue occurs if the number of categories increase. Then, using the group lasso regression, we will show how the best model should be fitted for that kind of multinomial regression problems comprehensively.

Analyses of Short Pulse Generation Using Heterodyne Techniques

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.281-284
    • /
    • 2007
  • We have analyzed the short pulse generation using heterodyne techniques. The numerical model for semiconductor lasers under the heterodyne technique is based on the Lang's equation and has been extended in order to take into account the simultaneous injection of the multiple sidebands of the current-modulated laser. The unselected sidebands will affect the optical and RF-spectral characteristics even when the semiconductor laser is locked to the target sidebands.

Analyses of Characteristics for Direct Intensity Modulation Scheme

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.3
    • /
    • pp.101-104
    • /
    • 2006
  • We have investigated the spectral characteristics of the semiconductor lasers locked to the sidebands of the master laser in this paper, which were expressed by a series of the Bessel function. The numerical model for the semiconductor lasers based on the typical Lang's equation has been extended in order to take into account the simultaneous injection of the multiple sidebands of the directly modulated ML. We analyses characteristics of direct intensity modulation.

New security requirements for cloud services account fraud (클라우드 서비스 계정도용 방지를 위한 새로운 보안 요구사항)

  • Ahn, Dong-Il;Choi, Jin-Young
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.66-69
    • /
    • 2014
  • 클라우드는 IT를 직접 소유하기 보다 제 3 자가 제공하는 소프트웨어, 플랫폼, 인프라구조 등을 필요에 따라 선택하고 이용하는 방식으로 시스템을 중앙에서 집중 관리하여 규모의 경제를 달성하는 데 용이하지만 해커에게는 더 없이 매력적인 공격 대상이 된다. 아무리 완벽한 보안 설비와 정책을 이행하고 있더라도 사용자의 아이디와 패스워드가 도용 되었을 때 발생되는 문제점은 치명적이다. 본 논문에서는 사용자의 편의성을 보장하면서 계정도용을 방지하기 위한 새로운 보안 요구사항을 제시하고자 한다.

Definite Descriptions and Attitude Reports in Situation Semantics

  • Cho, Young-Soon
    • Language and Information
    • /
    • v.3 no.1
    • /
    • pp.83-95
    • /
    • 1999
  • In this paper I will seek to show that situation theoretic analysis of the attitudes can finely describe references of definite descriptions in attitude reports: co-reference, mis-reference, and speaker's reference. Situation theoretic concepts of a proposition and a resource situation provide excellent means to account for these references: Proposition, which is the combination of a type and an assignment, can combine linguistic and non-linguistic information; Resource situation, sometimes realized as speaker's wrong knowledge situation about an individual, can serve to explain idiosyncratic aspects of attitude reports.

  • PDF

Comparison of the Practical Use Condition of e-finance Portal Site between Korea and U.S.A. (한.미간 e-finance 금융포털사이트의 활용실태 비교)

  • Kim Dong-Gyoon;Cha Soon-Kwean
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.21-51
    • /
    • 2001
  • For increasing the competitiveness and efficiency of Korea's finance industry under the new e-finance paradigm, this paper compared the practical use of finance portal site' on service parts and stage between Korea and U.S.A.. The services which can be served from site are banking, mortgage and credit loan, stock, card, retirement tax, PFM(Personal Finance Management), EBPP(Electronic Bill Presentment and Payment) and Account Aggregation and so on. The stage of site can be divided as the information provide stage which only gives information about service parts, on-line transaction stage which real-time transaction is possibile and PFM services provide stage according to development process. As a result, the beginning of finance portal service in Korea was lated about 10years and more than it of U.S.A. So the development stage of domestic portal site is still staying in the first step and the providing services and contents or business model development parts are also in the same stage than U.S.A. Resides, Korea's sites mainly focus on their first service parts even though they recently aim internet finance portal, and provide not real time transaction but finance information. On the other hand, the U.S.A. site support substantially not only various on-line transactions but also distinctive personal services like PFM(Personal Finance Management), EBPP(Electronic Bill Presentment and Payment), Account Aggregation and Trans-account, brokerage, education center, mortgage loan, mutual fund, option, pension fund and IPOs and so on. Thus, the site of Korea need to establish real type of internet finance portal which provides one-stop services on every type of finance to customers in the real time and also require the strategic integration among finance institutions. The next turn, they need to build information system and education center to give best satisfaction to customers and acquire customer information and marker environment changes and need to provide distinctive services to quality customers throughout database from this. Also the site should provide various type of banking services which refereed above like PEM, EBPP and education center etc, and the government of Korea should support the building of IT infrastructure to Physical, legal, systematic, sociocultural, technical and human resource sections. This paper provided the future movement direction of the domestic finance portal through comparison and analysis on the practical use of it between Korea and U.S.A. and also wanted to contribute for developing and reading of Korea finance portal in the new era of the finance paradigm.

  • PDF

The Service Log Analyser for Blocking Unused Account on Internet Services (인터넷 서비스 미 사용 계정 차단을 위한 서비스 로그 분석기)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2007
  • The fact that since Internet has been spreaded widely to people, Many security problems also have been grown too much. Due to sudden growth, administrator's responsibility for secure network and services has been growing more and more. This paper represents how to prevent account which didn't use for long period on multi domains environment using service log analysis. hence administrator can find security hole on systems and can dealing with it. The Service Log Analyzer is that loading log file which are written by each service and analyzing them. as a result it makes a list named Used User List contains a number of account names which uses specific services. When the time has come - means cron job schedule time, User Usage Shifter is the next runner. it's mission is finding the person who didn't used service for a specific period of time. Then modifying the expire day of the account information.

  • PDF

Resource Allocation for Maximizing Energy Efficiency in Energy Harvesting Networks with Channel Estimation Error (채널 추정 오차가 존재하는 에너지 하베스팅 네트워크에서 에너지 효율성을 최대화 하는 자원할당 방안)

  • Lee, Kisong;Hong, Jun-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.506-512
    • /
    • 2016
  • Recently, energy harvesting technology is considered as a tool to improve the lifetime of sensor networks by mitigating the battery capacity limitation problem. However, the previous work on energy harvesting has failed to provide practical information since it has assumed an ideal channel knowledge model with perfect channel state information at transmitter (CSIT). This paper proposes an energy efficient resource allocation scheme that takes account of the channel estimation process and the corresponding estimation error. Based on the optimization tools, we provide information on efficient scheduling and power allocation as the functions of channel estimation accuracy, harvested energy, and data rate. The simulation results confirm that the proposed scheme outperforms the conventional energy harvesting networks without considering channel estimation error in terms of energy efficiency. Furthermore, with taking account of channel estimation error, the results provides a new way for allocating resources and scheduling devices.

Donate system development using Blockchain technology (블록체인 기반 기부 시스템 개발)

  • An, Kyu-hwang;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.812-817
    • /
    • 2018
  • Blockchain technology removes the central system and connects each block throughout every person. This paper proposes new method to exploit the blockchain feature to apply existing donation system. In the current system, the donator does not donate to poor neighbor which means donator must have to donate some donate organization. The donator does not recognize how the donation has been spent after donation. In this case, we can solve that problem by using the blockchain where the donator can watch how the money works and everyone can browse the account history. To make a virtual fundraising box based on blockchain technology, donator sends some money at virtual account and exchanges the money to crypto-currency. Donator can use crypto-currency which is donate to poor neighbor that poor neighbor can exchanges crypto-currency to the money. Through this proposed system, the donation is managed by secure and transparent blockchain system.