• Title/Summary/Keyword: Stock Information

Search Result 1,240, Processing Time 0.027 seconds

Analysis of the Relationship between the Initial Public Offering Process and Earnings Management - Focusing on SSE-listed SMEs of China (기업의 상장과정과 이익조정과의 관계분석 - 중국의 SSE상장 중소기업을 중심으로)

  • Kim, Dong-Il
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.243-249
    • /
    • 2020
  • This study analyzes the earnings management that can occur in the process of public offering in the process of SMEs reducing cost of capital, risks and seeking opportunities for direct financing. Since a company is subject to strict supervision during the IPO process, it is possible to prevent the phenomenon that the company value evaluated in the market is underestimated, or to perform earnings management in consideration of overestimation. This study attempted to verify the degree of earnings management through discretionary accruals and actual earnings management values that can affect the earnings ratio of the IPO of a company. For this study, total accruals were calculated and analyzed through discretionary accruals, sales, costs, and actual earnings management adjustments from production activities. As a result of the analysis, discretionary accruals, which are the countermeasures for earnings management during the listing process, have a positive(+) relationship in both the stock price return and the sales adjustment value, which can be viewed as a factor that induces high valuation. As a result of this, there may be a risk of adverse selection for the benefit amount, and information asymmetry may exist for public offering stocks. This study can provide useful guidelines for evaluating corporate value to domestic SMEs and investors that do business with Chinese companies as well as China through the current and type of earnings management of Chinese listed companies.

Analysis of Intrinsic Patterns of Time Series Based on Chaos Theory: Focusing on Roulette and KOSPI200 Index Future (카오스 이론 기반 시계열의 내재적 패턴분석: 룰렛과 KOSPI200 지수선물 데이터 대상)

  • Lee, HeeChul;Kim, HongGon;Kim, Hee-Woong
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.119-133
    • /
    • 2021
  • As a large amount of data is produced in each industry, a number of time series pattern prediction studies are being conducted to make quick business decisions. However, there is a limit to predicting specific patterns in nonlinear time series data due to the uncertainty inherent in the data, and there are difficulties in making strategic decisions in corporate management. In addition, in recent decades, various studies have been conducted on data such as demand/supply and financial markets that are suitable for industrial purposes to predict time series data of irregular random walk models, but predict specific rules and achieve sustainable corporate objectives There are difficulties. In this study, the prediction results were compared and analyzed using the Chaos analysis method for roulette data and financial market data, and meaningful results were derived. And, this study confirmed that chaos analysis is useful for finding a new method in analyzing time series data. By comparing and analyzing the characteristics of roulette games with the time series of Korean stock index future, it was derived that predictive power can be improved if the trend is confirmed, and it is meaningful in determining whether nonlinear time series data with high uncertainty have a specific pattern.

Fluorescence Anisotropy Study on the Effect of Phellodendri Cortex's Berberine on Regulation of the Function of DNA (황백(黃柏)의 berberine이 DNA의 기능조절에 미치는 영향에 관한 형광이방성 연구)

  • Lee, Seong Kyung;Han, Hyo Sang;Huh, Sung Ho
    • The Korea Journal of Herbology
    • /
    • v.33 no.5
    • /
    • pp.105-110
    • /
    • 2018
  • Objectives : We tried to observe the fluorescence anisotropy and intensity of ethidium ion in the intercalating binding interaction between DNA and ethidium ions in the presence of berberine, and then tried to explain the effect of berberine on the intercalating interaction of ethidium ion with DNA. Methods : DNA(calf thymus DNA), berberine and ethidium bromide(EtBr) were purchased from Sigma-Aldrich Co. Proper amount of each compound was dissolved in 20 mM sodium phosphate buffer(pH 7.0) containing 100 mM of NaCl to prepare stock solutions. Collections of the fluorescence anisotropy and intensity data were performed on JASCO FP-8300 spectrofluorometer equipped with a polarizer and a Peltier temperature controller. The excitation of ethidium ion was done at 550 nm and the emission data were collected at 600 nm. For Stern-Volmer plot, the fluorescence data were collected at $18^{\circ}C$ and $30^{\circ}C$. Results : According to the results of this research, the weak competitive binding pattern between ethidium ion and berberine appeared in binding with DNA at low ratio of DNA to ethidium ion. But at high ratio of DNA to ethidium ion, this weak competition disappeared. Instead, berberine might bind to DNA by intercalating way. In other words, berberine could de-intercalate ethidium ion from DNA at low concentration of DNA relative to ethidium ion, but could not at high concentration of DNA relative to ethidium ion. In addition, the mechanism of fluorescence quenching of ethidium ion could also proceed differently, depending on the ratio of the amount of DNA to that of ethidium ion. Conclusions : The effect of berberine on the DNA-ethidium ion intercalating interaction could work differently, depending on the relative ratio of the amount of DNA to that of ethidium ion. This study also showed that fluorescence anisotropy analysis is very useful method to obtain detailed information for investigation of the complex binding interactions. In order to fully understand the mechanism of action of the pharmacological effect by berberine, studies on the effect of berberine on the action of proteins such as various enzymes closely related to berberine-induced medicinal effects should be continued.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

The Impact of SMEs' Financing Strategies on Firm Valuation: Choice Competition between Retained Earnings and Debt (중소기업의 자본조달 방식이 기업가치에 미치는 영향: 내부유보자금과 부채의 선택경쟁)

  • Lee, Juil;Kim, Sang-Joon
    • Korean small business review
    • /
    • v.41 no.1
    • /
    • pp.29-51
    • /
    • 2019
  • This study investigates how SMEs' (small and medium-sized enterprises) financing strategies affect firm valuation. Given that information asymmetry is engaged in firm valuation in the stock market, investors interpret the meanings of debt financing depending on how SMEs construct the portfolio of financing strategies (retained earnings vs debt financing), thereby making investment decision. Specifically, given that SMEs' debt financing has two meanings in the market signals, called "benefit" and "cost", this study postulates that firm valuation will be differently made by investors, depending on how they interpret the meanings of debt financing under choice competition between retained earnings and debt financing. In this study, we argue that under choice competition, as a SME's debt proportion increases, the "cost" signal outweighes the "benefit" signal, thereby decreasing firm valuation. Moreover, the effect of such signal can be contingent on the SME's characteristics-firm visibility. These ideas are examined using 363 U.S. SMEs ranging from 1971 to 2010. The fixed-effects models estimating Tobin's q show that under choice competition, a SME's debt proportion has a negative impact on firm valuation and that the firm's high visibility mitigates the effect of "cost" signal. In conclusion, this study sheds new light on how investors' interpretations of SMEs' financing strategies affect firm valuation.

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.

Sentiment Analysis of Movie Review Using Integrated CNN-LSTM Mode (CNN-LSTM 조합모델을 이용한 영화리뷰 감성분석)

  • Park, Ho-yeon;Kim, Kyoung-jae
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.141-154
    • /
    • 2019
  • Rapid growth of internet technology and social media is progressing. Data mining technology has evolved to enable unstructured document representations in a variety of applications. Sentiment analysis is an important technology that can distinguish poor or high-quality content through text data of products, and it has proliferated during text mining. Sentiment analysis mainly analyzes people's opinions in text data by assigning predefined data categories as positive and negative. This has been studied in various directions in terms of accuracy from simple rule-based to dictionary-based approaches using predefined labels. In fact, sentiment analysis is one of the most active researches in natural language processing and is widely studied in text mining. When real online reviews aren't available for others, it's not only easy to openly collect information, but it also affects your business. In marketing, real-world information from customers is gathered on websites, not surveys. Depending on whether the website's posts are positive or negative, the customer response is reflected in the sales and tries to identify the information. However, many reviews on a website are not always good, and difficult to identify. The earlier studies in this research area used the reviews data of the Amazon.com shopping mal, but the research data used in the recent studies uses the data for stock market trends, blogs, news articles, weather forecasts, IMDB, and facebook etc. However, the lack of accuracy is recognized because sentiment calculations are changed according to the subject, paragraph, sentiment lexicon direction, and sentence strength. This study aims to classify the polarity analysis of sentiment analysis into positive and negative categories and increase the prediction accuracy of the polarity analysis using the pretrained IMDB review data set. First, the text classification algorithm related to sentiment analysis adopts the popular machine learning algorithms such as NB (naive bayes), SVM (support vector machines), XGboost, RF (random forests), and Gradient Boost as comparative models. Second, deep learning has demonstrated discriminative features that can extract complex features of data. Representative algorithms are CNN (convolution neural networks), RNN (recurrent neural networks), LSTM (long-short term memory). CNN can be used similarly to BoW when processing a sentence in vector format, but does not consider sequential data attributes. RNN can handle well in order because it takes into account the time information of the data, but there is a long-term dependency on memory. To solve the problem of long-term dependence, LSTM is used. For the comparison, CNN and LSTM were chosen as simple deep learning models. In addition to classical machine learning algorithms, CNN, LSTM, and the integrated models were analyzed. Although there are many parameters for the algorithms, we examined the relationship between numerical value and precision to find the optimal combination. And, we tried to figure out how the models work well for sentiment analysis and how these models work. This study proposes integrated CNN and LSTM algorithms to extract the positive and negative features of text analysis. The reasons for mixing these two algorithms are as follows. CNN can extract features for the classification automatically by applying convolution layer and massively parallel processing. LSTM is not capable of highly parallel processing. Like faucets, the LSTM has input, output, and forget gates that can be moved and controlled at a desired time. These gates have the advantage of placing memory blocks on hidden nodes. The memory block of the LSTM may not store all the data, but it can solve the CNN's long-term dependency problem. Furthermore, when LSTM is used in CNN's pooling layer, it has an end-to-end structure, so that spatial and temporal features can be designed simultaneously. In combination with CNN-LSTM, 90.33% accuracy was measured. This is slower than CNN, but faster than LSTM. The presented model was more accurate than other models. In addition, each word embedding layer can be improved when training the kernel step by step. CNN-LSTM can improve the weakness of each model, and there is an advantage of improving the learning by layer using the end-to-end structure of LSTM. Based on these reasons, this study tries to enhance the classification accuracy of movie reviews using the integrated CNN-LSTM model.

Effect of Venture Capitalists on the ChiNext IPO First-Day Return in China (중국 차이넥스트 시장의 벤처캐피탈이 IPO 첫날 수익률에 미치는 영향)

  • Kang, Kai;Ahialey, Joseph Kwaku;Kang, Ho-Jung
    • Management & Information Systems Review
    • /
    • v.36 no.4
    • /
    • pp.117-127
    • /
    • 2017
  • In recent times the size of the world IPO in general has skyrocketed. Specifically, China's financial market development is becoming important as both the size of China's capital market and the number of companies going public are gradually increasing. This has led to a rapid development of venture vapital(VC) institutions in China for the past couple of decades. This study focuses on one of the three markets of China's Shenzhen Stock Exchange-the Growth Enterprise Board((GEB) hereafter, ChiNext). The ChiNext is established in October, 2009 to enable hi-tech or high growth potential technology companies that find it relatively difficult to fulfil the listing requirements of either the Shenzhen Main Board or Small and Medium Size Enterprise Board(SMEB) to go public. This study covers a three-year period(2012/01/-2015/01) and analyze first day initial return of 83 venture capital-backed companies and 53 non-venture capital-backed companies using T-test. Regression analysis is used as to examine the variables affecting IPO's first-day return. The empirical results are four-fold. First, the level of first day return of venture-backed is significantly lower than non venture capital backed support in the Chinese venture capital market. Second, the level of first-day return of listed companies supported by foreign venture capital is significantly higher than that of companies receiving domestic venture capital support. Third, the firms that have a large number of venture capital firms showed a low level of first-day return. Fourth, regression result for the IPO first-day return which is as dependent variable indicates that the venture capital support(VCAP), number of venture capital(VCNum), offering size(Lnsize) and PER all affect have negative effect on the first day initial return. Also, the venture capital type(VCType), turnover ratio and the the firm type(Tech-firms) statistically affect IPO first day return positively. Finally, by shedding more light on the IPO first-day return, this paper provides meaningful information to investors about the Chinese IPO market.

  • PDF

Establishment of Database System for Radiation Oncology (방사선 종양 자료관리 시스템 구축)

  • Kim, Dae-Sup;Lee, Chang-Ju;Yoo, Soon-Mi;Kim, Jong-Min;Lee, Woo-Seok;Kang, Tae-Young;Back, Geum-Mun;Hong, Dong-Ki;Kwon, Kyung-Tae
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.20 no.2
    • /
    • pp.91-102
    • /
    • 2008
  • Purpose: To enlarge the efficiency of operation and establish a constituency for development of new radiotherapy treatment through database which is established by arranging and indexing radiotherapy related affairs in well organized manner to have easy access by the user. Materials and Methods: In this study, Access program provided by Microsoft (MS Office Access) was used to operate the data base. The data of radiation oncology was distinguished by a business logs and maintenance expenditure in addition to stock management of accessories with respect to affairs and machinery management. Data for education and research was distinguished by education material for department duties, user manual and related thesis depending upon its property. Registration of data was designed to have input form according to its subject and the information of data was designed to be inspected by making a report. Number of machine failure in addition to its respective repairing hours from machine maintenance expenditure in a period of January 2008 to April 2009 was analyzed with the result of initial system usage and one year after the usage. Results: Radiation oncology database system was accomplished by distinguishing work related and research related criteria. The data are arranged and collected according to its subjects and classes, and can be accessed by searching the required data through referring the descriptions from each criteria. 32.3% of total average time was reduced on analyzing repairing hours by acquiring number of machine failure in addition to its type in a period of January 2008 to April 2009 through machine maintenance expenditure. Conclusion: On distinguishing and indexing present and past data upon its subjective criteria through the database system for radiation oncology, the use of information can be easily accessed to enlarge the efficiency of operation, and in further, can be a constituency for improvement of work process by acquiring various information required for new radiotherapy treatment in real time.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.