• Title/Summary/Keyword: attribute-based

Search Result 1,450, Processing Time 0.028 seconds

Seasoned Equity Offering announcement and Market Efficiency (유상증자공시와 시장효율성)

  • Chung, Hyun-Chul;Jeong, Young-Woo
    • The Korean Journal of Financial Management
    • /
    • v.25 no.3
    • /
    • pp.79-109
    • /
    • 2008
  • According to asymmetric information hypothesis (for example, Ross (1977), Myers and Majluf (1984)), the impact of seasoned equity offering (SEO) announcement on the stock price depends mainly on the informational market efficiency. Despite of the importance of this fact, most of the previous SEO-related studies have done under the assumption of equal informational market efficiency among sample firms. This study intends to solve this problematic assumption and explores the real impact of SEO announcement on the stock prices. For this purpose, we divide 122 SEO firms into two subgroups; one with firms from KOSPI200 and the other including firms from the rest of KOSPI, assuming the former is more informationally efficient than the latter. Different from the US market-based study demonstrating short-and long-term negative price impacts of SEO announcement, most of the Korean market-based ones show price increases up until the announcement and decreases just after the announcement and in the long run. These previous studies attribute this difference to the different market system and regulation between them. Our results indicate that this discrepancy can be attributed to the different degree of market efficiency as well as the different market system and regulation.

  • PDF

A Study of Field Application Process of Public Key Algorithm RSA Based on Mathematical Principles and Characteristics through a Diagnostic (수학원리와 특성 진단을 기반으로 한 공개키 RSA 알고리즘의 현장 적용 프로세스)

  • Noh, SiChoon;Song, EunJee;Moon, SongChul
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.71-81
    • /
    • 2015
  • The RSA public key encryption algorithm, a few, key generation, factoring, the Euler function, key setup, a joint expression law, the application process are serial indexes. The foundation of such algorithms are mathematical principles. The first concept from mathematics principle is applied from how to obtain a minority. It is to obtain a product of two very large prime numbers, but readily tracking station the original two prime number, the product are used in a very hard principles. If a very large prime numbers p and q to obtain, then the product is the two $n=p{\times}q$ easy station, a method for tracking the number of p and q from n synthesis and it is substantially impossible. The RSA encryption algorithm, the number of digits in order to implement the inverse calculation is difficult mathematical one-way function and uses the integer factorization problem of a large amount. Factoring the concept of the calculation of the mod is difficult to use in addition to the problem in the reverse direction. But the interests of the encryption algorithm implementation usually are focused on introducing the film the first time you use encryption algorithm but we have to know how to go through some process applied to the field work This study presents a field force applied encryption process scheme based on public key algorithms attribute diagnosis.

A Study on the Eating Behaviors and Characteristics of Consumption Propensities on Dining out as Perceived by Silver Generation in Seoul (서울지역 실버고객들의 외식식습관과 소비행동 속성에 관한 연구)

  • Choi, Mi-Sook;Kim, Dong-Ho;Park, Hyo-Nam;Kim, Seong-Su
    • Culinary science and hospitality research
    • /
    • v.21 no.1
    • /
    • pp.250-266
    • /
    • 2015
  • This study concentrated on the dining out consumption behaviors, dining out selection attributes, and changes in eating habits of silver generation. Total 216 residents in metropolitan area were employed for statistical analysing. The results are as follows. First, as the result of t-test and ANOVA showed that female and higher academic background tended to regularly take high level of fruits, vegetables, meat, and fish eating habits. These results identified that dining out culture and dietary lifestyle are closely linked. Second, as the result of difference in dining out consumption attitudes on eating habit of silver generation, consumers who have better eating behaviors tended to consider the physical environment, variety of menu, and service quality when they choose a restaurant. Third, as the result of analysis on changes in dining out consumption behavior based on eating behavior of silver consumers, groups differences were found from only the source for information on dining out business and standard variable in selection of dining out business. Fourth, physical environment, variety of menu, business quality, and service were indicated as significant selection attributes of dining out among silver peoples. Fifth, dining out consumption behaviors of silver consumers were developed through newspapers, magazines, and previous visiting experiences. In conclusion, the results of present study showed that silver consumers tend to select a restaurant based on word-of-mouth and various factors related to experiences. Hence, various promotional activities are necessary for the business succession.

Development of a Prototype for GIS-based Flood Risk Map Management System (GIS를 이용한 홍수위험지도 관리시스템 프로토타입 개발에 관한 연구)

  • Kim, Kye-Hyun;Yoon, Chun-Joo;Lee, Sang-Il
    • Journal of Korea Water Resources Association
    • /
    • v.35 no.4 s.129
    • /
    • pp.359-366
    • /
    • 2002
  • The damages from the natural disasters, especially from the floods, have been increasing. Therefore, it is imperative to establish a BMP to diminish the damages from the floods and to enhance the welfare of the nation. Developed countries have been generating and utilizing flood risk maps to raise the alertness of the residents, and thereby achieving efficient flood management. The major objectives of this research were to develop a prototype management system for flood risk map to forecast the boundaries oi the inundation and to plot them through the integration of geographic and hydrologic database. For more efficient system development, the user requirement analysis was made. The GIS database design was done based on the results from the research work of river information standardization. A GIS database for the study area was built by using topographic information to support the hydrologic modeling. The developed prototype include several modules; river information edition module, map plotting module, and hydrologic modeling support module. Each module enabled the user to edit graphic and attribute data, to analyze and to represent the modeling results visually. Subjects such as utilization of the system and suggestions for future development were discussed.

Development of 3D Digital Map Editing System (3차원 수치지도 편집 시스템 개발)

  • Lee, Jae-Kee;Park, Ki-Surk
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.3
    • /
    • pp.239-247
    • /
    • 2007
  • The 3D spatial information projects have been processed and utilized in varied fields. However, the research of the 3D digital map for a role of national base map is not enough. The draft maps, which are raw data for generating 2D digital map, shows problems in generating 3D digital map. The objective of this research is to develop 3D digital map editing system for modifying and editing of 3D digital map from 2D vector and raster information such as a draft map, 2D digital map, DEM, aerial photo and so forth. This 3D digital map editing system was designed to include data structure of geometric and attribute object under provision of ISO/TC211 and OGC standard. This system was developed to implement the function of 3D stereo editing based on stereo viewing, 3D view editing based on projective, and 3D spatial operation. Using this system, 3D digital maps were able to be successfully produced from not only existing draft maps but also modified or edited draft maps and then application results were compared and analyzed.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Similarity checking between XML tags through expanding synonym vector (유사어 벡터 확장을 통한 XML태그의 유사성 검사)

  • Lee, Jung-Won;Lee, Hye-Soo;Lee, Ki-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.9
    • /
    • pp.676-683
    • /
    • 2002
  • The success of XML(eXtensible Markup Language) is primarily based on its flexibility : everybody can define the structure of XML documents that represent information in the form he or she desires. XML is so flexible that XML documents cannot be automatically provided with an underlying semantics. Different tag sets, different names for elements or attributes, or different document structures in general mislead the task of classifying and clustering XML documents precisely. In this paper, we design and implement a system that allows checking the semantic-based similarity between XML tags. First, this system extracts the underlying semantics of tags and then expands the synonym set of tags using an WordNet thesaurus and user-defined word library which supports the abbreviation forms and compound words for XML tags. Seconds, considering the relative importance of XML tags in the XML documents, we extend a conventional vector space model which is the most generally used for document model in Information Retrieval field. Using this method, we have been able to check the similarity between XML tags which are represented different tags.

Attribute Utility-Based Negotiation Agent Methodology for Customer-To-Customer Electronic Commerce (소비자간 전자상거래를 위한 속성효용기반 자동협상 방법론의 개발)

  • Song Yong U.;Hong June S.;Kim Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.73-89
    • /
    • 2004
  • Since people have come to access more and more information about products with the proliferation of the Internet, more and more customer-to-customer e-marketplaces are being introduced with rapidly increasing transaction volumes. As the role of customer-to-customer electronic commerce has become increasingly regarded as vital to the economy, much research has delved into developing intelligent agent systems to efficiently support customer-to-customer electronic commerce. Most of this research, however, has focused only on supporting simple negotiation for the price of common goods along the time span. To expand the negotiation object to the differentiated goods, the customer must be allowed to negotiate over multi-at-tributes of the product besides the price, including the attributes related to the transaction activity itself, such as delivery time and payment method. To satisfy this requirement, we propose an agent marketplace for differentiated goods where the agent of a customer can negotiate not only the price but also the various attributes of the product and the transaction in order to achieve a better utility level for both buyer and seller. The formal protocol and the architecture issues to support the proposed e-marketplace and agents are also addressed.

  • PDF

Energy Efficient Query Processing based on Multiple Query Optimization in Wireless Sensor Networks (무선 센서 네트워크에서 다중 질의 최적화 기법을 이용한 에너지 효율적인 질의 처리 기법)

  • Lee, Yu-Won;Chung, Eun-Ho;Haam, Deok-Min;Lee, Chung-Ho;Lee, Yong-Jun;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.1
    • /
    • pp.8-21
    • /
    • 2009
  • A wireless sensor network is a computer network which consists of spatially distributed devices, called sensor nodes. In wireless sensor networks, energy efficiency is a key issue since sensor nodes must resides upon limited energy. To retrieve sensor information without dealing with the network issues, a sensor network is treated as conceptual database on which query can be requested. When multiple queries are requested for processing in a wireless sensor network, energy consumption can be significantly reduced if common partial results among similar queries can be effectively shared. In this paper, we propose an energy efficient multi-query processing technique based on the coverage relationship between multiple queries. When a new query is requested, our proposed technique derives an equivalent query from queries running at the moment, if it is derivable. Our technique first computes the set of running queries that may derive a partial result of the new query and then test if this set covers all the result of the new query attribute-wise and tuple-wise. If the result of the new query can be derived from the results of executing queries, the new query derives its result at the base station instead of being executed in the sensor network.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.