• Title/Summary/Keyword: Information Processing Technology

Search Result 7,928, Processing Time 0.035 seconds

Factors Affecting Consumers' Acceptance of e-Commerce Consumer Credit Service: Multiple Group Path Analysis by Naver Shopping and Coupang (이커머스 후불결제(BNPL) 수용에 영향을 미치는 요인: 네이버쇼핑과 쿠팡 간 다중집단 비교)

  • Kim, Su Jin;Mo, Jeonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.105-135
    • /
    • 2022
  • As COVID-19 has led to a surge in e-commerce Buy Now Pay Later(BNPL) has become preferred choice among millennials. In Korea Coupang followed by Naver Pay offers a deferred payment, aiming to create customer lock-in effect, save credit card processing fee and lay the groundwork for entering into new financial services. However the literature related to the influential factors of customers' usage intention toward a deferred payment is scarce. For the study, a multi-group analysis was carried out to find differences between Naver shopping and Coupang. The results revealed that the important factors that affect a deferred payment adoption were compatibility, impulsive buying tendency in Naver shopping, whereas compatibility, relative advantage, additional value in Coupang(listed in order of most important). In addition, impulsive buying tendency had a positive effect on adoption intention in Naver shopping and on perceived risk in Coupang. The results imply that Naver shopping need to focus on managing delinquency while Coupang should provide sufficient information on how late fees and credit rating downgrade work and try not to make a deferred payment option stand out. In order to increase adoption rate it is recommendable to narrow down target segment of a deferred payment and expand it to a specialized vertical such as travel.

UX Design of Mobile Banking Usage Improvement for Seniors (시니어들을 위한 모바일 뱅킹 이용률 개선을 위한 UX 디자인)

  • Jongbin Lee;Homin Boun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.325-332
    • /
    • 2023
  • Currently, the world's population has already entered a super-aging era, and the rate is expected to increase rapidly to about 40% by 2050. However, the rapid development of automation technology and the online service sector, the main technologies of the Fourth Industrial Revolution, are still further isolating them in a world where many inconveniences and development technologies are applied. As such, alienation in daily life is widely expanded in various fields, but the financial service sector is one of the must-use areas regardless of age because of its strong nature in the public service sector, and is a very important factor in the period when branches are rapidly decreasing. However, the current utilization rate of mobile banking services is not around 5%, so users over 60 are rarely able to use them. The UX design of the most frequently used remittance service screen in mobile banking services was proposed, and the difficulty of trying to find the preferred bank among 56 or more banks was solved by analyzing the usage rate of each bank and dividing it into three stages by age group from 50 or older. In addition, it was designed to strengthen customized services by showing their recently used banks as the top priority. The design proposed in this study obtained an average of 4.8 points or more out of 5 points as a result of usability satisfaction through interviews with less than 50 senior groups. This study is believed to help each bank upgrade its different mobile banking designs in a unified manner.

Unlicensed Band Traffic and Fairness Maximization Approach Based on Rate-Splitting Multiple Access (전송률 분할 다중 접속 기술을 활용한 비면허 대역의 트래픽과 공정성 최대화 기법)

  • Jeon Zang Woo;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2023
  • As the spectrum shortage problem has accelerated by the emergence of various services, New Radio-Unlicensed (NR-U) has appeared, allowing users who communicated in licensed bands to communicate in unlicensed bands. However, NR-U network users reduce the performance of Wi-Fi network users who communicate in the same unlicensed band. In this paper, we aim to simultaneously maximize the fairness and throughput of the unlicensed band, where the NR-U network users and the WiFi network users coexist. First, we propose an optimal power allocation scheme based on Monte Carlo Policy Gradient of reinforcement learning to maximize the sum of rates of NR-U networks utilizing rate-splitting multiple access in unlicensed bands. Then, we propose a channel occupancy time division algorithm based on sequential Raiffa bargaining solution of game theory that can simultaneously maximize system throughput and fairness for the coexistence of NR-U and WiFi networks in the same unlicensed band. Simulation results show that the rate splitting multiple access shows better performance than the conventional multiple access technology by comparing the sum-rate when the result value is finally converged under the same transmission power. In addition, we compare the data transfer amount and fairness of NR-U network users, WiFi network users, and total system, and prove that the channel occupancy time division algorithm based on sequential Raiffa bargaining solution of this paper satisfies throughput and fairness at the same time than other algorithms.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Development and Efficacy Validation of an ICF-Based Chatbot System to Enhance Community Participation of Elderly Individuals with Mild Dementia in South Korea (우리나라 경도 치매 노인의 지역사회 참여 증진을 위한 ICF 기반 Decision Tree for Chatbot 시스템 개발과 효과성 검증)

  • Haewon Byeon
    • Journal of Advanced Technology Convergence
    • /
    • v.3 no.3
    • /
    • pp.17-27
    • /
    • 2024
  • This study focuses on the development and evaluation of a chatbot system based on the International Classification of Functioning, Disability, and Health (ICF) framework to enhance community participation among elderly individuals with mild dementia in South Korea. The study involved 12 elderly participants who were living alone and had been diagnosed with mild dementia, along with 15 caregivers who were actively involved in their daily care. The development process included a comprehensive needs assessment, system design, content creation, natural language processing using Transformer Attention Algorithm, and usability testing. The chatbot is designed to offer personalized activity recommendations, reminders, and information that support physical, social, and cognitive engagement. Usability testing revealed high levels of user satisfaction and perceived usefulness, with significant improvements in community activities and social interactions. Quantitative analysis showed a 92% increase in weekly community activities and an 84% increase in social interactions. Qualitative feedback highlighted the chatbot's user-friendly interface, relevance of suggested activities, and its role in reducing caregiver burden. The study demonstrates that an ICF-based chatbot system can effectively promote community participation and improve the quality of life for elderly individuals with mild dementia. Future research should focus on refining the system and evaluating its long-term impact.

Development of Acquisition and Analysis System of Radar Information for Small Inshore and Coastal Fishing Vessels - Suppression of Radar Clutter by CFAR - (연근해 소형 어선의 레이더 정보 수록 및 해석 시스템 개발 - CFAR에 의한 레이더 잡음 억제 -)

  • 이대재;김광식;신형일;변덕수
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.39 no.4
    • /
    • pp.347-357
    • /
    • 2003
  • This paper describes on the suppression of sea clutter on marine radar display using a cell-averaging CFAR(constant false alarm rate) technique, and on the analysis of radar echo signal data in relation to the estimation of ARPA functions and the detection of the shadow effect in clutter returns. The echo signal was measured using a X -band radar, that is located on the Pukyong National University, with a horizontal beamwidth of $$3.9^{\circ}$$, a vertical beamwidth of $20^{\circ}$, pulsewidth of $0.8 {\mu}s$ and a transmitted peak power of 4 ㎾ The suppression performance of sea clutter was investigated for the probability of false alarm between $l0-^0.25;and; 10^-1.0$. Also the performance of cell averaging CFAR was compared with that of ideal fixed threshold. The motion vectors and trajectory of ships was extracted and the shadow effect in clutter returns was analyzed. The results obtained are summarized as follows;1. The ARPA plotting results and motion vectors for acquired targets extracted by analyzing the echo signal data were displayed on the PC based radar system and the continuous trajectory of ships was tracked in real time. 2. To suppress the sea clutter under noisy environment, a cell averaging CFAR processor having total CFAR window of 47 samples(20+20 reference cells, 3+3 guard cells and the cell under test) was designed. On a particular data set acquired at Suyong Man, Busan, Korea, when the probability of false alarm applied to the designed cell averaging CFAR processor was 10$^{-0}$.75/ the suppression performance of radar clutter was significantly improved. The results obtained suggest that the designed cell averaging CFAR processor was very effective in uniform clutter environments. 3. It is concluded that the cell averaging CF AR may be able to give a considerable improvement in suppression performance of uniform sea clutter compared to the ideal fixed threshold. 4. The effective height of target, that was estimated by analyzing the shadow effect in clutter returns for a number of range bins behind the target as seen from the radar antenna, was approximately 1.2 m and the information for this height can be used to extract the shape parameter of tracked target..

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Calculation of Dry Matter Yield Damage of Whole Crop Maize in Accordance with Abnormal Climate Using Machine Learning Model (기계학습 모델을 이용한 이상기상에 따른 사일리지용 옥수수 생산량 피해량)

  • Jo, Hyun Wook;Kim, Min Kyu;Kim, Ji Yung;Jo, Mu Hwan;Kim, Moonju;Lee, Su An;Kim, Kyeong Dae;Kim, Byong Wan;Sung, Kyung Il
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.41 no.4
    • /
    • pp.287-294
    • /
    • 2021
  • The objective of this study was conducted to calculate the damage of whole crop maize in accordance with abnormal climate using the forage yield prediction model through machine learning. The forage yield prediction model was developed through 8 machine learning by processing after collecting whole crop maize and climate data, and the experimental area was selected as Gyeonggi-do. The forage yield prediction model was developed using the DeepCrossing (R2=0.5442, RMSE=0.1769) technique of the highest accuracy among machine learning techniques. The damage was calculated as the difference between the predicted dry matter yield of normal and abnormal climate. In normal climate, the predicted dry matter yield varies depending on the region, it was found in the range of 15,003~17,517 kg/ha. In abnormal temperature, precipitation, and wind speed, the predicted dry matter yield differed according to region and abnormal climate level, and ranged from 14,947 to 17,571, 14,986 to 17,525, and 14,920 to 17,557 kg/ha, respectively. In abnormal temperature, precipitation, and wind speed, the damage was in the range of -68 to 89 kg/ha, -17 to 17 kg/ha, and -112 to 121 kg/ha, respectively, which could not be judged as damage. In order to accurately calculate the damage of whole crop maize need to increase the number of abnormal climate data used in the forage yield prediction model.

Dynamic Virtual Ontology using Tags with Semantic Relationship on Social-web to Support Effective Search (효율적 자원 탐색을 위한 소셜 웹 태그들을 이용한 동적 가상 온톨로지 생성 연구)

  • Lee, Hyun Jung;Sohn, Mye
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.19-33
    • /
    • 2013
  • In this research, a proposed Dynamic Virtual Ontology using Tags (DyVOT) supports dynamic search of resources depending on user's requirements using tags from social web driven resources. It is general that the tags are defined by annotations of a series of described words by social users who usually tags social information resources such as web-page, images, u-tube, videos, etc. Therefore, tags are characterized and mirrored by information resources. Therefore, it is possible for tags as meta-data to match into some resources. Consequently, we can extract semantic relationships between tags owing to the dependency of relationships between tags as representatives of resources. However, to do this, there is limitation because there are allophonic synonym and homonym among tags that are usually marked by a series of words. Thus, research related to folksonomies using tags have been applied to classification of words by semantic-based allophonic synonym. In addition, some research are focusing on clustering and/or classification of resources by semantic-based relationships among tags. In spite of, there also is limitation of these research because these are focusing on semantic-based hyper/hypo relationships or clustering among tags without consideration of conceptual associative relationships between classified or clustered groups. It makes difficulty to effective searching resources depending on user requirements. In this research, the proposed DyVOT uses tags and constructs ontologyfor effective search. We assumed that tags are extracted from user requirements, which are used to construct multi sub-ontology as combinations of tags that are composed of a part of the tags or all. In addition, the proposed DyVOT constructs ontology which is based on hierarchical and associative relationships among tags for effective search of a solution. The ontology is composed of static- and dynamic-ontology. The static-ontology defines semantic-based hierarchical hyper/hypo relationships among tags as in (http://semanticcloud.sandra-siegel.de/) with a tree structure. From the static-ontology, the DyVOT extracts multi sub-ontology using multi sub-tag which are constructed by parts of tags. Finally, sub-ontology are constructed by hierarchy paths which contain the sub-tag. To create dynamic-ontology by the proposed DyVOT, it is necessary to define associative relationships among multi sub-ontology that are extracted from hierarchical relationships of static-ontology. The associative relationship is defined by shared resources between tags which are linked by multi sub-ontology. The association is measured by the degree of shared resources that are allocated into the tags of sub-ontology. If the value of association is larger than threshold value, then associative relationship among tags is newly created. The associative relationships are used to merge and construct new hierarchy the multi sub-ontology. To construct dynamic-ontology, it is essential to defined new class which is linked by two more sub-ontology, which is generated by merged tags which are highly associative by proving using shared resources. Thereby, the class is applied to generate new hierarchy with extracted multi sub-ontology to create a dynamic-ontology. The new class is settle down on the ontology. So, the newly created class needs to be belong to the dynamic-ontology. So, the class used to new hyper/hypo hierarchy relationship between the class and tags which are linked to multi sub-ontology. At last, DyVOT is developed by newly defined associative relationships which are extracted from hierarchical relationships among tags. Resources are matched into the DyVOT which narrows down search boundary and shrinks the search paths. Finally, we can create the DyVOT using the newly defined associative relationships. While static data catalog (Dean and Ghemawat, 2004; 2008) statically searches resources depending on user requirements, the proposed DyVOT dynamically searches resources using multi sub-ontology by parallel processing. In this light, the DyVOT supports improvement of correctness and agility of search and decreasing of search effort by reduction of search path.

Two-Dimensional Interpretation of Ear-Remote Reference Magnetotelluric Data for Geothermal Application (심부 지열자원 개발을 위한 원거리 기준점 MT 탐사자료의 2차원 역산 해석)

  • Lee, Tae-Jong;Song, Yoon-Ho;Uchida, Toshihiro
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.2
    • /
    • pp.145-155
    • /
    • 2005
  • A two-dimensional (2-D) interpretation of MT data has been performed for the purpose of fracture detection for geothermal development. Remote stations have been operated in Kyushu, Japan (480 km apart) as well as in Korea (60 km and 165 km apart in 2002 and 2003 data set, respectively). Apparent resistivity and phase curves calculated by remote processing with the Japan remote data showed enough quality for 2-D inversion for the whole frequency range. Remote reference processing with Korea remote reference data also showed quite good continuity in apparent resistivity and phase curves except some noisy frequency bands; around the power frequency, 60 Hz, and around the dead band $10^{-1}Hz\;Hz\;\~1\;Hz$, where the natural EM signal is known to be very weak. Even though the subsurface showed severe three-dimensional (3-D) characteristics in the survey area so that 2-D inversion by itself could not give enough information for deep geological structures, the 2-D inversion for the 5 survey lines showed several common features. The conductive semi-consolidate mudstone layer is dipping from north to south (about 500 m depth on the south and 200 m on the north most part of the survey area). The boundary between the low (L-2) and high (H-2) resistivity anomalies can be thought as a major fault with strike $N15^{\circ}E$, passing through the sites 206, 112 and 414. The shallow (< 1 km) conductive anomalies (L-4) seem to be fracture zones having strike E-W (at site 105) and $N60^{\circ}W$ (at site 434). And there exists a conductive layer in the western and west-southern part of the survey area in the depth below $2\~3\;km$, for which further investigation is to be needed.