• Title/Summary/Keyword: Banking System

Search Result 410, Processing Time 0.026 seconds

A Comparative Assessment Between LVTS of Canada and Fedwire of America as a Wholesale Electronic Payment System (미국과 캐나다의 거액전자지급결제제도 비교연구 - 미국의 Fedwire와 캐나다의 LVTS를 중심으로 -)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.43-63
    • /
    • 2017
  • I focused on LVTS compare with Fedwire to advance a research effects in this paper. The Fedwire Funds Service is generally used to make large-value, time-critical payments. The Federal Reserve Banks provide the Fedwire Funds Service, a real-time gross settlement system that enables participants to initiate funds transfer that are immediate, final, and irrevocable once processed. The Fedwire Funds Service is a credit transfer service. While, The LVTS(Large Value Transfer System) is the high value electronic wire system that facilitates the transfer of irrevocable payments in canadian dollars across the country. Through LVTS, funds can be transferred between participating financial institutions virtually instantaneously in a fully collateralized environment. Thus in this article, first of all, I considered features of payment system between LVTS and Fedwire. Second, I analyzed the governing structure and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that the payment and banking system have to assume, with good reason, more efficiently accurately and securely operation together with conclusion.

  • PDF

Design and Implementation of an Embedded Spatial MMDBMS for Spatial Mobile Devices (공간 모바일 장치를 위한 내장형 공간 MMDBMS의 설계 및 구현)

  • Park, Ji-Woong;Kim, Joung-Joon;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.1 s.13
    • /
    • pp.25-37
    • /
    • 2005
  • Recently, with the development of wireless communications and mobile computing, interest about mobile computing is rising. Mobile computing can be regarded as an environment where a user carries mobile devices, such as a PDA or a notebook, and shares resources with a server computer via wireless communications. A mobile database refers to a database which is used in these mobile devices. The mobile database can be used in the fields of insurance business, banking business, medical treatment, and so on. Especially, LBS(Location Based Service) which utilizes location information of users becomes an essential field of mobile computing. In order to support LBS in the mobile environment, there must be an Embedded Spatial MMDBMS(Main-Memory Database Management System) that can efficiently manage large spatial data in spatial mobile devices. Therefore, in this paper, we designed and implemented the Embedded Spatial MMDBMS, extended from the HSQLDB which is an existing MMDBMS for PC, to manage spatial data efficiently in spatial mobile devices. The Embedded Spatial MMDBMS adopted the spatial data model proposed by ISO(International Organization for Standardization), provided the arithmetic coding method that is suitable for spatial data, and supported the efficient spatial index which uses the MBR compression and hashing method suitable for spatial mobile devices. In addition, the system offered the spatial data display capability in low-performance processors of spatial mobile devices and supported the data caching and synchronization capability for performance improvement of spatial data import/export between the Embedded Spatial MMDBMS and the GIS server.

  • PDF

Assessments for MGARCH Models Using Back-Testing: Case Study (사후검증(Back-testing)을 통한 다변량-GARCH 모형의 평가: 사례분석)

  • Hwang, S.Y.;Choi, M.S.;Do, J.D.
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.2
    • /
    • pp.261-270
    • /
    • 2009
  • Current financial crisis triggered by shaky U.S. banking system adds to the emphasis on the importance of the volatility in controlling and understanding financial time series data. The ARCH and GARCH models have been useful in analyzing economic time series volatilities. In particular, multivariate GARCH(MGARCH, for short) provides both volatilities and conditional correlations between several time series and these are in turn applied to computations of hedge-ratio and VaR. In this short article, we try to assess various MGARCH models with respect to the back-testing performances in VaR study. To this end, 14 korean stock prices are analyzed and it is found that MGARCH outperforms rolling window, and BEKK and CCC are relatively conservative in back-testing performance.

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.

A Case Study of Reinforcing Ground behind Abutment using Twin-Jet Method (트윈제트공법을 이용한 교대 배면 기초보강 사례)

  • Kim, Yong-Hyun;Jang, Yeon-Soo
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.638-645
    • /
    • 2010
  • This study introduces a reinforcement work case using Twin-Jet Method. The area is located behind the abutment of the bridges built on soft clay along the $\bigcirc\bigcirc$ Express Highway. Its foundation was constructed by installing EPS blocks on the original ground to reduce the embankment load under the highway. However, the ground deformation has continuously occurred due to the settlement of the foundation soft cohesive soils. The amounts of subsidences at the surface turned out to be 20~30.0mm, After the pavement patch work on April 23, 2009, a drastic subsidence occurred together with 10mm swell, For this reason, Twin-Jet grout column construction was applied by passing through the EPS banking blocks without closing traffic flows on the express highway. The outcomes of core sample tests after reinforcing the ground turned out to be TCR 92.5%, RQD 64.6% and unconfined compressive strength 2.3~8.6Mpa. The test results showed that the condition of the ground foundation had improved using Twin-Jet grouting in most layers of ground including the cobble and gravel layer.

  • PDF

A Development of Construction Informatization Index based on End Users' Viewpoints (사용자 관점의 건설현장 정보화 수준평가를 위한 지표개발)

  • Lee Woo-Jin;Kim Yea-Sang;Chin Sang-Yoon;Kim Kyung-Rai;Jung Young-Soo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.282-285
    • /
    • 2003
  • The construction industry has been behind in informatization compared to other industries such as banking, manufacturing, medical, etc. since it is not conscious of informatization and it also has difficulties in attracting investments and attracting IT experts. Furthermore, there has been lack of survey and research on that specifically what areas and how much degree they are behind in informatization. This paper presents a framework and strategy for assessment of informatization based on end users' viewpoints. The authors has already performed the assessment of informatization of general contractors based on IT experts' viewpoints. However, this paper tries to assess informatizaton of construction based on end users' aspects. The result of this research is expected to provide various aspects such as assessment, identification of needs, and problems regarding information systems. These could be effectively used as a guideline and a direction for information system development.

  • PDF

Tool Development for Identifying Components using Object-Oriented Domain Models (객체 지향 도메인 모델을 이용한 컴포넌트 식별 도구 개발)

  • 이우진;권오천
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.381-392
    • /
    • 2003
  • Component-based Development(CBD) based on the software reuse has been more attractive from software companies that want to enhance software productivity. However, since component identification process is mainly dependent on domain expert´s intuition and experience, it was very difficult to develop tools for supporting the component identification process. In this paper, we propose a systematic procedure of identifying reusable component by using object dependencies and object usages and provide a design and implementation of its supporting tool. In object-oriented domain models. there exists several diagrams which are described in different viewpoints. From these diagrams, object dependency and object usages are extracted and merged into an object dependency network, which is a basis for performing a comfonent identification algorithm. Finally, through a case study of internet banking system, we evaluate the applicability of the proposed identification process and tool.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.

The history, present status and future perspective of electronics and electronic technologies (전자공학 및 전자기술의 역사, 현황 그리고 미래)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.24 no.6
    • /
    • pp.106-112
    • /
    • 1991
  • Electronics has different meanings to different people and in different countries. Hence, let me difine the term in the sense that it is used here. Electronics in the science and the technology of the passage of charged particles in a gas, in a vacumn, or in a semiconductor. The beginning of electronics came in 1895 when H. A. Lorentz postulated the existence of discrete charges called electrons. Two years later J.J. Thompson found these electrons experimentally. In the same year (1897) Braun built what was probaly the first electron tube, essentially a primitive cathode-ray tube. It was not until the start of the 20th century that electronics began to take technological shape. In 1904 Fleming invented the diode which he called a valve. This era begins with the invention of the transistor about 30 years ago. The history of this invention is interesting. M.J. Kelly, director of research(and later president of Bell Laboratories), had the foresight to realize that the telephone system needed electronic switching and better amplifiers. Vacuum tubes were not very reliable, principally because they generated a great deal of heat even when they were not being used, and, particularly, because filaments burned out and the tubes had to be replaced. In 1945 a solid-state physics group wa formed. The foregoing completes the history of electronics and electronic industries up to 1978. There is already a start toward a merging of the computer and the communication industries which might be called information manipulation. This includes storage of information, sorting, computation, information retrieval, and transmission of data. This combination of the computer and the communication fields will penetrate many disciplines. Applications will be made in the fields of law, medicine, biological sciences, engineering, library services publishing banking, reservation systems, management control, education, and defense.

  • PDF

Implementation of counterfeit banknote detection counter using RTOS (RTOS를 이용한 위폐검출 계수기의 구현)

  • 정원근;신태민;이건기
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.364-370
    • /
    • 2002
  • A banknote counter is a machine that automates counting the money in some agencies to treat much banknotes as well as general banking agencies. The banknote counter materialized in this paper is the machine that adds the function of banknote sorting, detecting plural banknote and detecting counterfeit banknote to an existing banknote counter. The technique of sensor signal processing are used for banknote sorting. The technique of sensor application and data processing are used for detecting counterfeit banknote. The technique of precision equipment design and microprocessor application are used for high speed count. Software improved in debugging and difficulties to link with additional hardware. It was materialized through effective control algorithm and real-time signal processing with C-language on the basis of RTOS(real-time operating system) Photodiode, its applications and a magnetic resistance sensor are used as a sensor device with regard to hardware cost -cutting and process velocity. PCF80C552-24 of Philips using Intel I8051 core is used as a control microprocessor. As the results so far achieved, counterfeit banknotes made by the use of a color duplicator and a color Printer, are distinguished from real banknotes through mixing an optical with a magnetic sensor. and, in case that there are some different banknotes while counting, it is prevented for them to be counted without discriminating from the same kind of banknotes in addition to the fu notion of banknote sorting.