• Title/Summary/Keyword: Card Detection

Search Result 81, Processing Time 0.026 seconds

Sound Detection System of Machines in Thermal Power Plant. (화력발전 설비의 사운드 모니터링 시스템)

  • 이성상;정의필;손창호
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.157-160
    • /
    • 2003
  • 발전소에서 운전중인 기계들의 안전운전과 예지 보전을 위하여 발전설비의 고장 감지 및 진단과 상태 모니터링은 중대한 역할을 담당하고 있다. 이 연구에서는 설비의 안전하고 신뢰적인 운전을 위한 기계의 작동상태를 사운드 정보로 획득하고 분석하는 시스템을 제안하였다. 사운드 정보의 사용은 적은 양의 채널의 사용으로 많은 기계 및 설비의 이상 유무의 판별을 가능케 하며, 이를 획득하기 위하여 3개의 마이크로폰, 다채널 A/D변환기, 다채널 I/O Sound Card(Soundtrack DSP24) 및 PC로 시스템을 구성하였다. 소프트웨어 개발언어로서 Microsoft Visual C++ 및 MATLAB을 이용하였다. 화력 발전소에 운전중인 주요기계들의 사운드 정보를 취득하여 취득한 기계별 사운드 정보를 이용하여 주파수 특성을 파악하고, 이를 이용하여 기기의 운전 상태진단을 가능하게 한다.

  • PDF

A Design of a Screen Monitoring Controller for the Electric Furnace Temperature Control (전기로 온도제어를 위한 화면감시 제어기 설계)

  • 오진석
    • Journal of the Korean Society of Safety
    • /
    • v.12 no.2
    • /
    • pp.80-86
    • /
    • 1997
  • In this paper, a temperature controller with monitor function is proposed for the electric furnace system. This controller includes holding and ramp control function, and the control program for the temperature process monitor of the electric furnace. For this purpose, the implementation and performance of auto tuning algorithms in a computer-based controller was studied in relation to the control of nonlinear electric furnace system which is characterized with large delay time. The control program for this controller programmed by c-language. To communicate a control and detection signals, between the controller and the electric furnace is implemented by the I/O data card. We apply the temperature controller to the practical electric furnace. As a result, the proposed controller shows the better status characteristic.

  • PDF

A Detection Technique for Credit-card Robbery using Time Weight and Distanced-based Graph (시간가중치와 거리기반 도표를 이용한 신용카드 도난 분실 탐지 기법)

  • 나용찬;나연묵
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.229-231
    • /
    • 2001
  • 최근들어 경제활동의 증가로 대부분의 성인들은 몇 장의 신용카드를 소지하고 있을 것이다. 이에 따른 신용카드의 도난 분실 사고는 카드사의 문제가 되고있다. 기존의 탐지 시스템은 도난신고 등의 일반적인 탐지와 갑작스런 사용 액수의 증가를 탐지하여 도난 분실 카드를 판별하였다. 이것은 소액의 부정거래탐지가 어렵다는 단점이 있다. 본 논문에서 제시하는 탐지 시스템은 outlier 기법을 사용하여 training set을 만들고 시간가중치와 거리기반 도표를 이용하여 도난 분실 카드를 탐지한다. 금액, 시간 도표에서 거래요구시간의 차를 계산하여 가중치를 주고 장소, 소비종류 도표에서는 training set에서 얻은 자료인 저녁 8시를 기준으로 소비종류의 배열을 바꾼다. 제안된 시스템은 소액의 부정거래 탐지에도 우수하고 이전의 시스템보다 정확함을 장점으로 한다.

  • PDF

Credit Card Fraud Detection based on Boosting Algorithm (부스팅 알고리즘 기반 신용 카드 이상 거래 탐지)

  • Lee Harang;Kim Shin;Yoon Kyoungro
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.621-623
    • /
    • 2023
  • 전자금융거래 시장이 활발해지며 이에 따라 신용 카드 이상 거래가 증가하고 있다. 따라서 많은 금융 기관은 신용 카드 이상 거래 탐지 시스템을 사용하여 신용 카드 이상 거래를 탐지하고 개인 피해를 줄이는 등 소비자를 보호하기 위해 큰 노력을 하고 있으며, 이에 따라 높은 정확도로 신용 카드 이상 거래를 탐지할 수 있는 실시간 자동화 시스템에 대한 개발이 요구되었다. 이에 본 논문에서는 머신러닝 기법 중 부스팅 알고리즘을 사용하여 더욱 정확한 신용 카드 이상 거래 탐지 시스템을 제안하고자 한다. XGBoost, LightGBM, CatBoost 부스팅 알고리즘을 사용하여 보다 정확한 신용 카드 이상 거래 탐지 시스템을 개발하였으며, 실험 결과 평균적으로 정밀도 99.95%, 재현율 99.99%, F1-스코어 99.97%를 취득하여 높은 신용 카드 이상 거래 탐지 성능을 보여주는 것을 확인하였다.

Credit Card Fraud Detection Based on SHAP Considering Time Sequences (시간대를 고려한 SHAP 기반의 신용카드 이상 거래 탐지)

  • Soyeon yang;Yujin Lim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.370-372
    • /
    • 2023
  • 신용카드 부정 사용은 고객 및 기업의 신용과 재산에 막대한 손실을 미치고 있다. 이에 따라 금융사들은 이상금융거래탐지시스템을 도입하였으나 이상 거래 발생 여부를 지속적으로 모니터링하고 있기 때문에 시스템 유지에 많은 비용이 따른다. 따라서 본 논문에서는 컴퓨팅 리소스를 절약함과 동시에 성능 개선 효과를 보인 신용카드 이상 거래 탐지 알고리즘을 제안한다. CTGAN 을 활용하여 정상 거래와 이상 거래의 비율을 일부 완화하였고 XAI 기법인 SHAP 를 활용하여 유의미한 속성값을 선택하였다. 이것을 기반으로 LSTM Autoencoder를 사용하여 이상데이터를 탐지하였다. 그 결과 전통적인 비지도 학습 기법에 비해 제안 알고리즘이 우수한 성능을 보였음을 확인하였다.

Establishment of Quick Model for Private Consumption Symptom (민간소비 이상징후에 대한 속보성 모형 구축)

  • Ahn, Sung-Hee;Lee, Zoonky;Ha, Ji-Eun
    • The Journal of Bigdata
    • /
    • v.2 no.1
    • /
    • pp.59-69
    • /
    • 2017
  • According to precedent research of disaster economics, most of the studies are either based on belated macroeconomic indicators or are limited to specific industries. It is certain that preventing disaster is important, but immediate analysis and reconstruction policy are crucial as well. This research analyzed the ripple effect of consumer spending followed by April 16 ferry disaster and MERS outbreak; it was done by applying credit card company's real-time big data with Marketing Mix Modeling. The main focus of this research is to see if it is possible to predict the scale of damage during ongoing disasters. It is found that setting up weekly MMM and moving the timeline draws significance conclusion. When disasters or events occur in future, this research may be the basis of building quick and intuitive indicator to monitor possible effects.

  • PDF

GIS Application for 1-1-9 Caller Location Information System (GIS를 이용한 신고자 위치표시 시스템 개발)

  • Hahm, Chang-Hahk;Jeong, Jae-Hu;Ryu, Joong-Hi;Kim, Eung-Nam
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.97-103
    • /
    • 2000
  • The main purpose of 1-1-9 Caller Location Information System is to identify and display the precise location of emergency incidents such as natural or man - made fires, medical emergencies and accidents. The state - of- the - art technologies such as Am (Automatic Number Identification), GIS(Geographical Information System) and GPS (Global Positioning System) were applied and integrated in the system for efficient and effective location identification. It displays a radius of 25M, 50M and 100M on the map after location identification. The system can also provide the shortest path to an incident location from a fire station or a fire engine. In case of a fire breakout in or near a building, the attribute information of the building, called a building attribute card, is displayed along with the map location. The system then matches the information with the fire situation and sends an alert to a responsible fire station by phone or fax in order to help promptly react to the problem. An attribute card includes the critical information of a premise such as building's location, number of stories, floor plans, capacity, construction history, indoor fire detection and Prevention facilities, etc.

  • PDF

Concealed information test using ERPs and pupillary responses (ERP와 동공 반응을 이용한 숨긴정보검사)

  • Eom, Jin-Sup;Park, Kwang-Bai;Sohn, Jin-Hun
    • Science of Emotion and Sensibility
    • /
    • v.15 no.2
    • /
    • pp.259-268
    • /
    • 2012
  • In a P300-based concealed information test (P300 CIT), the result of the test is greatly affected by the value of the probe stimulus. With a probe stimulus of low value, the detection rate decreases. The aim of this study was to determine whether the pupil-based concealed information test (Pupil CIT) could be used in addition to the P300 CIT for the probes of low value. Participants were told to choose one card from a deck of five cards (space 2, 3, 4, 5, 6), Then a P300 CIT and a Pupil CIT for the selected card were administered. P300s were measured at 3 scalp sites (Fz, Cz, and Pz), and the pupil sizes of left and right eyes were recorded. The P300 amplitude measured at Fz, Cz, and Pz was significantly different between the probe and irrelevant stimuli. And, in the Pupil CIT, the pupil size was also different between the two stimuli for both eyes. The detection rates of the P300 CIT were 44% at Fz and Cz sites and 36% at Pz site. And the detection rates of the Pupil CIT were 52% for the left eye and 60% for the right eye. There is a trend that the detection rate of the Pupil CIT was higher than that of the P300 CIT, but the difference didn't reach significance partly because of the relatively small sample size. The correlation between the decision based on the P300 CIT and that based on the Pupil CIT was not significant. As a conclusion, it is recommended to use a Pupil CIT instead of a P300 CIT when the value of the probe is low. And a combination of the measures may be superior to either one of them in detection rate.

  • PDF

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions