• Title/Summary/Keyword: Private Consumption

Search Result 205, Processing Time 0.021 seconds

Establishment of Quick Model for Private Consumption Symptom (민간소비 이상징후에 대한 속보성 모형 구축)

  • Ahn, Sung-Hee;Lee, Zoonky;Ha, Ji-Eun
    • The Journal of Bigdata
    • /
    • v.2 no.1
    • /
    • pp.59-69
    • /
    • 2017
  • According to precedent research of disaster economics, most of the studies are either based on belated macroeconomic indicators or are limited to specific industries. It is certain that preventing disaster is important, but immediate analysis and reconstruction policy are crucial as well. This research analyzed the ripple effect of consumer spending followed by April 16 ferry disaster and MERS outbreak; it was done by applying credit card company's real-time big data with Marketing Mix Modeling. The main focus of this research is to see if it is possible to predict the scale of damage during ongoing disasters. It is found that setting up weekly MMM and moving the timeline draws significance conclusion. When disasters or events occur in future, this research may be the basis of building quick and intuitive indicator to monitor possible effects.

  • PDF

Teen Based Secure Group Communication Scheme for Wireless Sensor Networks (무선 센서네트워크를 위한 TEEN 기반의 안전한 그룹통신 기법)

  • Seo, Il-Soo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.71-78
    • /
    • 2009
  • It is very difficult to apply previous security protocols to WSNs(Wireless Sensor Networks) directly because WNSs have resource constrained characteristics such as a low computing ability, power, and a low communication band width. In order to overcome the problem, we proposes a secure group communication scheme applicable to WSNs. The proposed scheme is a combined form of the TEEN(Threshold sensitive Energy Efficient sensor Network protocol) clustering based hierarchical routing protocol and security mechanism, and we assume that WSNs are composed of sensor nodes, cluster headers, and base stations. We use both private key and public key cryptographic algorithms to achieve an enhanced security and an efficient key management. In addition, communications among sensor nodes, cluster headers, and base stations are accomplished by a hierarchical tree architecture to reduce power consumption. Therefore, the proposed scheme in this paper is well suited for WSNs since our design can provide not only a more enhanced security but also a lower power consumption in communications.

  • PDF

A Study on the Energy Saving House System Using IOT Technology (IOT 기술을 활용한 에너지 절약 하우스 시스템 연구)

  • Huh, Myung-Hoi;Shin, shung-jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.109-113
    • /
    • 2020
  • Against the backdrop of low-carbon, green growth, many attention is focused on a sustainable society where humans and nature coexist. Carbon emissions increase with energy consumption, which is 40 percent of the world's energy consumption by buildings. Korea has a plan to make zero-energy houses mandatory only for new buildings in 2025, but it is relying on private technology investment for its technology. The reality is that the current technology costs more than 1.5 times more than general buildings, and private companies do not have many zero-energy house complexes other than experimental houses. This study aims to study the new model of zero energy house by introducing IOT system that efficiently observes and controls energy in zero energy house, monitoring pleasant environment on the web and introducing resident proper temperature maintenance system.

Secure power demand forecasting using regression analysis on Intel SGX (회귀 분석을 이용한 Intel SGX 상의 안전한 전력 수요 예측)

  • Yoon, Yejin;Im, Jong-Hyuk;Lee, Mun-Kyu
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.7-18
    • /
    • 2017
  • Electrical energy is one of the most important energy sources in modern society. Therefore, it is very important to control the supply and demand of electric power. However, the power consumption data needed to predict power demand may include the information about the private behavior of an individual, the analysis of which may raise privacy issues. In this paper, we propose a secure power demand forecasting method where regression analyses on power consumption data are conducted in a trusted execution environment provided by Intel SGX, keeping the power usage pattern of users private. We performed experiments using various regression equations and selected an equation which has the least error rate. We show that the average error rate of the proposed method is lower than those of the previous forecasting methods with privacy protection functionality.

Import Demand in Developed Economies & Korean Exports (선진국 수입수요가 우리나라 수출에 미치는 영향)

  • Choi, Moon Jung;Kim, Kyung Kuen
    • Economic Analysis
    • /
    • v.25 no.1
    • /
    • pp.34-65
    • /
    • 2019
  • This paper investigates the effects on Korean exports of demand in developed economies, and how these effects have changed since the global financial crisis. As a measure of import demand, we use import intensity-adjusted demand to take into account heterogenous import intensities across components of aggregate demand. Our estimation of a dynamic panel regression model reveals that Korea's exports to the G7 countries were elastic with respect to the import demand of these countries until the global financial crisis, but have shifted to become inelastic since. Furthermore, we separately estimate the effects of the different components of the G7 countries' aggregate demand (private consumption, public consumption, investment and exports). The results show that the decrease in private consumption in the G7 countries during the crisis had a significant impact in causing the decline in Korea's exports to them, but that the increase in their public consumption since the crisis has had a significant effect on driving increased Korean exports to them. The effects of the G7 countries' exports on Korea's exports to them remain positive and significant during both the pre- and post-crisis periods. The effects of the G7 countries' investments on Korea's exports are also positive and significant, but the positive effect has weakened since the crisis. Our findings suggest that the overall effect of changes in the G7 countries' import demand on Korea's exports to them has weakened compared to the pre-crisis period.

The Performance and Implication of A Market-oriented Health Care System in United States (미국 시장지향 의료체계의 성과와 시사점)

  • Lee, Key-Hyo
    • Korea Journal of Hospital Management
    • /
    • v.9 no.1
    • /
    • pp.1-21
    • /
    • 2004
  • The United States has a unique health care system, which is unlikely any other health care systems in the world. The major part of basic functional components of the system -financing, insurance, delivery, and payment- is in private hands. A market-oriented economy invites the participation of numerous private entities that are interested in carrying out the key functions of health systems. Due to this central feature, U.S.health care is not delivered through a network of interrelated components designed to work together coherently. For lack of standardization, the various components of the system fit together only loosely. The involvement of numerous players in the key functions leads to duplication, overlap, inadequacy, inconsistency, and waste, which add to the complexity and also make the system inefficient. Hence, cost containment remains an elusive goals. Moreover, the system falls short of delivering equitable services to all americans, though consumption of health care services is the largest in the world. On the other hand, United States leads the world in the latest and the best in medical technology, medical training, and research. It offers some of the most sophisticated institutions, products, and processes of health care delivery. This article discuss the characteristic features of the U.S. health care system. and its performance, trying to seek its implication on Korean health care system.

  • PDF

Household Formation and Income Inequality (가구구성과 소득 불평등)

  • Kim, Dae Il;Lee, Simon Sokbae;Whang, Yoon-Jae
    • Journal of Labour Economics
    • /
    • v.37 no.3
    • /
    • pp.1-44
    • /
    • 2014
  • This paper investigates the effect of household formation on the mapping from wage inequality to income inequality, which usually is smaller than the former. Added workers, income pooling among household members, and shared consumption are the factors that make income distribution less inequal than wage distribution, and the effect of income pooling appears to be the greatest. This suggests than the increase in nuclear families and the resulting increase of old families have a potential effect of worsening income inequality at the absence of sufficient private income transfers among the two households. A simple counter-factual estimate indicates that income pooling among the children's and parents' households can efficiently and sizeably reduce income inequality.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Implementation and Analysis of Desktop Virtualization using Private Cloud Computing (사설 클라우드 컴퓨팅을 이용한 데스크탑 가상화 구현 및 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.482-488
    • /
    • 2012
  • Desktop is offered to each individual in Educational environments of school or academy, as the users are increasing, the more Desktop is required for each person. Huge Desktop accession resulted in many problems including difficulty of management, Software and Hardware cost rising, cramped places, power consumption increasing and etc. To solve those problems, we focus into uprising technology solution, such as Multi Computer, Desktop Virtualization, and DaaS(Desktop as a Service). In this paper, existing problems that can dramatically improve the private cloud computing for desktop virtualization with the requirements of the system were analyzed.

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.